New opportunities for integrated formal methods

M Gleirscher, S Foster, J Woodcock - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Formal methods have provided approaches for investigating software engineering
fundamentals and also have high potential to improve current practices in dependability …

[책][B] Secure systems development with UML

J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

CSP and determinism in security modelling

AW Roscoe - Proceedings 1995 IEEE Symposium on Security …, 1995 - ieeexplore.ieee.org
We show how a variety of confidentiality properties can be expressed in terms of the
abstraction mechanisms that CSP provides. We argue that determinism of the abstracted low …

Classification of Security Properties: (Part I: Information Flow)

R Focardi, R Gorrieri - International School on Foundations of Security …, 2000 - Springer
In the recent years, many formalizations of security properties have been proposed, most of
which are based on different underlying models and are consequently difficult to compare. A …

Process algebra and non-interference

PYA Ryan, SA Schneider - Journal of Computer Security, 2001 - content.iospress.com
Various formulations of non-interference have been proposed to try to characterise the
absence of information flows in system or network. There is still no consensus in the …

The Semantics of Circus

J Woodcock, A Cavalcanti - International Conference of B and Z Users, 2002 - Springer
The Semantics of Circus Page 1 The Semantics of Circus Jim Woodcock1 and Ana Cavalcanti2
1 Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford, UK …

Modelling and verifying key-exchange protocols using CSP and FDR

AW Roscoe - Proceedings The Eighth IEEE Computer Security …, 1995 - ieeexplore.ieee.org
We discuss the issues involved in modelling and verifying key-exchange protocols within the
framework of CSP and its model-checking tool FDR. Expressing such protocols within a …

Towards development of secure systems using UMLsec

J Jürjens - … Conference on Fundamental Approaches to Software …, 2001 - Springer
We show how UML (the industry standard in object-oriented modelling) can be used to
express security requirements during system development. Using the extension …

CSP-OZ: a combination of Object-Z and CSP

C Fischer - Formal Methods for Open Object-based Distributed …, 1997 - Springer
In this paper we define a combination of Object-Z and CSP called CSP-OZ. The basic idea is
to define a CSP-semantics for every Object-Z class. Special care is taken to capture the …

The compositional security checker: A tool for the verification of information flow security properties

R Focardi, R Gorrieri - IEEE Transactions on Software …, 1997 - ieeexplore.ieee.org
The Compositional Security Checker (CoSeC for short) is a semantic-based tool for the
automatic verification of some compositional information flow properties. The specifications …