Author of the publication

Verifying Abstract Information Flow Properties in Fault Tolerant Security Devices.

, and . ICFEM, volume 4260 of Lecture Notes in Computer Science, page 621-638. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Combined Approach for Information Flow Analysis in Fault Tolerant Hardware., and . ICECCS, page 117-128. IEEE Computer Society, (2007)Introducing Objects through Refinement., and . FM, volume 5014 of Lecture Notes in Computer Science, page 358-373. Springer, (2008)Refactoring Object-Z Specifications.. FASE, volume 2984 of Lecture Notes in Computer Science, page 69-83. Springer, (2004)Tracing secure information flow through mode changes., and . ACSC, volume 48 of CRPIT, page 303-310. Australian Computer Society, (2006)Introducing Objects through Refinement, and . (2008)A Minimal Set of Refactoring Rules for Object-Z., and . FMOODS, volume 5051 of Lecture Notes in Computer Science, page 170-184. Springer, (2008)MDA-Based Re-engineering with Object-Z, , , , and . (2006)MDA-Based Re-engineering with Object-Z., , , , and . MoDELS, volume 4199 of Lecture Notes in Computer Science, page 291-305. Springer, (2006)Compositional Class Refinement in Object-Z., and . FM, volume 4085 of Lecture Notes in Computer Science, page 205-220. Springer, (2006)Refactoring Real-time Specifications., and . Refine@FM, volume 214 of Electronic Notes in Theoretical Computer Science, page 359-380. Elsevier, (2008)