共 50 条
- [1] Formal Specification and Verification of MQTT Protocol in PlusCal-2 [J]. Wireless Personal Communications, 2021, 119 : 1589 - 1606
- [3] Formal Verification of Security Policy Implementations in Enterprise Networks [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 117 - +
- [4] Improving the Formal Verification of Reachability Policies in Virtualized Networks [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (01): : 713 - 728
- [5] Simplifying Neural Networks Using Formal Verification [J]. NASA FORMAL METHODS (NFM 2020), 2020, 12229 : 85 - 93
- [6] Formal Analysis of Smart Home Policies using Compositional Verification [J]. FEATURE INTERACTIONS IN SOFTWARE AND COMMUNICATION SYSTEMS X, 2009, : 220 - 233
- [7] Towards formal specification and verification of a role-based authorization engine using JML [J]. Proceedings - International Conference on Software Engineering, 2010, : 50 - 57
- [8] Using weak bisimulation for enterprise integration architecture formal verification - I [J]. ECBS 2007: 14TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS: RAISING EXPECTATIONS OF COMPUTER-BASES SYSTEMS, 2007, : 63 - +
- [9] Trust-based formal delegation framework for Enterprise Social Networks [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 127 - 134
- [10] A Flexible Authorization Mechanism for Enterprise Networks Using Smart-phone Devices [J]. 2018 12TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2018, : 437 - 440