Web Services, Formal Methods, and Behavioral Types
暂无分享,去创建一个
[1] E. Riccobene,et al. Automatic Review of Abstract State Machines by Meta Property Verification , 2010, NASA Formal Methods.
[2] Demis Ballis,et al. A Rule-based System for Web site Verification , 2006, Electron. Notes Theor. Comput. Sci..
[3] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[4] Insup Lee,et al. Privacy APIs: access control techniques to analyze and verify legal privacy policies , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[5] Insup Lee,et al. Run-Time Checking of Dynamic Properties , 2006, Electron. Notes Theor. Comput. Sci..
[6] A. Jefferson Offutt,et al. Modeling presentation layers of web applications for testing , 2009, Software & Systems Modeling.
[7] Sun Mao-shan,et al. A model checking approach to Web application navigation model with session mechanism , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[8] Antonio Cisternino,et al. Modeling web applications infrastructure with ASMs , 2014, Sci. Comput. Program..
[9] James R. Cordy,et al. Modelling methods for web application verification and testing: state of the art , 2009, Softw. Test. Verification Reliab..
[10] Paolo Arcaini,et al. A model‐driven process for engineering a toolset for a formal method , 2011, Softw. Pract. Exp..
[11] Satoru Izumi,et al. Using the Model Checker Spin for Web Application Design , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.
[12] Dana Petcu,et al. MODAClouds: A model-driven approach for the design and execution of applications on multiple Clouds , 2012, 2012 4th International Workshop on Modeling in Software Engineering (MISE).
[13] Dimitrios Kouzapas,et al. Type Checking Privacy Policies in the π-calculus , 2015, FORTE.
[14] Roxana-Maria Chelemen. Modeling a Web Application for Cloud Content Adaptation with ASMs , 2013, 2013 International Conference on Cloud Computing and Big Data.
[15] May Haydar,et al. A formal approach for run-time verification of web applications using scope-extended LTL , 2013, Inf. Softw. Technol..
[16] James Riely,et al. Resource Access Control in Systems of Mobile Agents , 2002, HLCL.
[17] Jorge Lobo,et al. An obligation model bridging access control policies and privacy policies , 2008, SACMAT '08.
[18] Paolo Arcaini,et al. AsmetaSMV: A Way to Link High-Level ASM Models to Low-Level NuSMV Specifications , 2010, ASM.
[19] David J. DeWitt,et al. X-Diff: an effective change detection algorithm for XML documents , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[20] Ying Liu,et al. A static compliance-checking framework for business process models , 2007, IBM Syst. J..
[21] Angelo Gargantini,et al. A Scenario-Based Validation Language for ASMs , 2008, ABZ.
[22] Angelo Gargantini,et al. A Metamodel-based Language and a Simulation Engine for Abstract State Machines , 2008, J. Univers. Comput. Sci..
[23] Michael Carl Tschantz,et al. Formalizing and Enforcing Purpose Restrictions in Privacy Policies , 2012, 2012 IEEE Symposium on Security and Privacy.
[24] Constance L. Heitmeyer,et al. On the Need for Practical Formal Methods , 1998, FTRTFT.
[25] Michael Carl Tschantz,et al. Formal Methods for Privacy , 2009, FM.
[26] Mark Ryan,et al. Model Checking Agent Knowledge in Dynamic Access Control Policies , 2013, TACAS.
[27] Francesco Tiezzi,et al. Regulating data exchange in service oriented applications , 2007, FSEN'07.
[28] Julian Rathke,et al. safeDpi: a language for controlling mobile code , 2005, Acta Informatica.
[29] Egon Börger,et al. Abstract State Machines. A Method for High-Level System Design and Analysis , 2003 .