共 50 条
- [1] Verification method of security model based on UML and model checking Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 699 - 708
- [2] Verification of Security Protocols VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13
- [3] Formal modeling and verification of security protocols on cloud computing systems based on UML 2.3 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 852 - 859
- [5] UML based Security Function Policy Verification Method for Requirements Specification 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 832 - 833
- [6] Security software formal modeling and verification method based on UML and Z Cao, K. (kunyucao@tju.edu.cn), 1600, Springer Verlag (332):
- [7] Security Software Formal Modeling and Verification Method Based on UML and Z CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 390 - 401
- [9] Verification of randomized security protocols 2017 32ND ANNUAL ACM/IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS), 2017,
- [10] Generic verification of security protocols MODEL CHECKING SOFTWARE, PROCEEDINGS, 2005, 3639 : 221 - 235