共 50 条
- [1] A review on security requirements specification by formal methods [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05):
- [3] Security requirements specification by formal methods: a research metadata analysis [J]. Multimedia Tools and Applications, 2024, 83 : 41847 - 41866
- [4] Formal Specification and Verification of Security Guidelines [J]. 2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017), 2017, : 267 - 273
- [5] Tools for formal specification, verification, and validation of requirements [J]. COMPASS '97 - ARE WE MAKING PROGRESS TOWARDS COMPUTER ASSURANCE?, 1997, : 35 - 47
- [6] Security Requirements Specification: A Formal Method Perspective [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 113 - 117
- [7] A generic approach to the formal specification of requirements [J]. FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 252 - 261
- [8] A formal requirements engineering method for specification, synthesis, and verification [J]. 8TH CONFERENCE ON SOFTWARE ENGINEERING ENVIRONMENTS - PROCEEDINGS, 1997, : 131 - 144
- [9] An Approach for Interoperability Requirements Specification and Verification [J]. ENTERPRISE INTEROPERABILITY, 2011, 76 : 89 - 102