共 50 条
- [1] Verification of UML-based security policy model [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 2005, 3482 : 973 - 982
- [2] Verifying Security Requirements using Model Checking Technique for UML-Based Requirements Specification [J]. 2014 IEEE 1ST INTERNATIONAL WORKSHOP ON REQUIREMENTS ENGINEERING AND TESTING (RET), 2014, : 18 - 25
- [3] UML-SR: A Novel Security Requirements Specification Language [J]. 2019 IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2019), 2019, : 342 - 349
- [4] Verification method of security model based on UML and model checking [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 699 - 708
- [5] A Formal Methods Approach to Security Requirements Specification and Verification [J]. 2019 24TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2019), 2019, : 236 - 241
- [6] An Extended UML Method for the Verification of Security Protocols [J]. 2014 19TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2014), 2014, : 19 - 28
- [7] Security Software Formal Modeling and Verification Method Based on UML and Z [J]. CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 390 - 401
- [8] Security software formal modeling and verification method based on UML and Z [J]. Cao, K. (kunyucao@tju.edu.cn), 1600, Springer Verlag (332):
- [10] Specification of security constraint in UML [J]. 35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 163 - 171