Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introducing Objects through Refinement., and . FM, volume 5014 of Lecture Notes in Computer Science, page 358-373. Springer, (2008)A Combined Approach for Information Flow Analysis in Fault Tolerant Hardware., and . ICECCS, page 117-128. IEEE Computer Society, (2007)MDA-Based Re-engineering with Object-Z, , , , and . (2006)MDA-Based Re-engineering with Object-Z., , , , and . MoDELS, volume 4199 of Lecture Notes in Computer Science, page 291-305. Springer, (2006)Compositional Class Refinement in Object-Z., and . FM, volume 4085 of Lecture Notes in Computer Science, page 205-220. Springer, (2006)Tracing secure information flow through mode changes., and . ACSC, volume 48 of CRPIT, page 303-310. Australian Computer Society, (2006)Refactoring Object-Z Specifications.. FASE, volume 2984 of Lecture Notes in Computer Science, page 69-83. Springer, (2004)Introducing Objects through Refinement, and . (2008)A Minimal Set of Refactoring Rules for Object-Z., and . FMOODS, volume 5051 of Lecture Notes in Computer Science, page 170-184. Springer, (2008)Verifying Abstract Information Flow Properties in Fault Tolerant Security Devices., and . ICFEM, volume 4260 of Lecture Notes in Computer Science, page 621-638. Springer, (2006)