Advertisement

Keywords

Business Application Static Checker Analysis Engine Case Tool Rules Analyzer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

6.5 Notes

  1. [JS04c]
    J. Jürjens and Pasha Shabalin. A foundation for tool-supported critical systems development with UML. In 11th Annual IEEE International Conference on the Engineering of Computer Based Systems (ECBS 2004), Brno, Czech Republic, May 24–26 2004. IEEE Computer Society, New York.Google Scholar
  2. [JS04b]
    J. Jürjens and P. Shabalin. XML-based analysis of UML models for critical systems development. In Advances in UML and XML Based Software Evolution. IDEA Group Publishing, 2004. To be published.Google Scholar
  3. [JS04a]
    J. Jürjens and P. Shabalin. Automated verification of UMLsec models for security requirements. In J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, UML 2004 — The Unified Modeling Language, volume 2460 of Lecture Notes in Computer Science, pages 412–425. Springer, Berlin Heidelberg New York, 2004.Google Scholar
  4. [Jür04g]
    J. Jürjens. Logic for security. In Spring School “Logic in Computer Science”, Venezia, 2004. Graduate school on Logic in Informatics, Munich.Google Scholar
  5. [Jür04c]
    J. Jürjens. Developing high-assurance secure systems with UML: An electronic purchase protocol. In Eighth IEEE International Symposium on High Assurance Systems Engineering (RASE 2004), pages 231–240. IEEE Computer Society, New York, 2004.Google Scholar
  6. [Jür04k]
    J. Jürjens. Tools for Critical Systems Development with UML. In 19th International Conference on Automated Software Engineering (ASE 2004). IEEE Computer Society, New York, 2004.Google Scholar
  7. [HMR+98]_F. Huber, S. Molterer, A. Rausch, B. Schätz, M. Sihling, and O. Slotosch. Tool supported specification and simulation of distributed systems. In International Symposium on Software Engineering for Parallel and Distributed Systems, pages 155–164, 1998.Google Scholar
  8. [RJW+03]
    [RJW+03]_J. Romberg, J. Jürjens, G. Wimmel, O. Slotosch, and G. Hahn. Auto-Focus and the MoDe Tool. In 3rd International Conference on Application of Concurrency to System Design (ACSD 2003), pages 249–250. IEEE Computer Society, New York, 2003.Google Scholar
  9. [Ste01b]
    P. Stevens. A revolution in UML tool use? Tool adaptation, extension and integration using XMI. UML 2001 tutorial, 2001.Google Scholar
  10. [Ste03a]
    P. Stevens. Small-scale XMI programming; a revolution in UML tool use? Journal of Automated Software Engineering, 10(l):7–21, 2003. Kluwer.MathSciNetGoogle Scholar
  11. [BJMF02]
    M. Boger, M. Jeckle, S. Mueller, and J. Fransson. Diagram Interchange for UML. In H. Hußmann, and S. Cook, editors. 5th International Conference on the Unified Modeling Language (UML 2002), volume 2460 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York, 2002. Jézéquel et al [JHC02], pages 398–411.Google Scholar
  12. [SKM01]
    T. Schäfer, A. Knapp, and S. Merz. Model checking UML state machines and collaborations. In S.D. Stoller and W. Visser, editors, Workshop on Software Model Checking, volume 55(3) of Electronic Notes in Theoretical Computer Science. Elsevier, Amsterdam, 2001. Satellite event of the 13th International Conference on Computer-Aided Verification (CAV 2001)Google Scholar
  13. [LP99]
    J. Lilius and I. Porres. Formalising UML state machines for model checking. In R. B. France and B. Rumpe, editors, The Unified Modeling Language (UML 1999), volume 1723 of Lecture Notes in Computer Science, pages 430–445. Springer, Berlin Heidelberg New York, 1999.Google Scholar
  14. [CRS04]
    A. Cavarra, E. Riccobene, and P. Scandurra. A framework to simulate uml models: moving from a semi-formal to a formal environment. In H. Haddad, A. Omicini, R. L. Wainwright, and L. M. Liebrock, editors, 2004 ACM Symposium on Applied Computing (SAG), pages 1519–1523, 2004.Google Scholar
  15. [HJ03a]
    S. Höhn and J. Jürjens. Automated checking of SAP security permissions. In 6th Working Conference on Integrity and Internal Control in Information Systems (IICIS). International Federation for Information Processing (IFIP), Kluwer Academic, Dordrecht, 2003.Google Scholar
  16. [Pol92]
    W. T. Polk. Automated tools for testing computer systems vulnerability. In NIST Special Publications. National Institute of Standards and Technology, December 1992.Google Scholar
  17. [BdVS02]
    P. Bonatti, S. De Capitani di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Transactions on Information and System Security, 5(1): 1–35, February 2002.CrossRefGoogle Scholar
  18. [RS01]
    A. Rosenthal and E. Sciore. Administering permissions for distributed data: Factoring and automated inference. In Conference on Data and Application Security, pages 91–104. International Federation for Information Processing (IFIP), 2001.Google Scholar
  19. [GHR03]
    J. D. Guttman, A. L. Herzog, and J. D. Ramsdell. Information flow in operating systems: Eager formal methods. In Gorrieri [Gor03], pages 81–90. Available at http://www.dsi.unive.it/IFIPWGl_7/WITS2003/program-wits03.htm.Google Scholar
  20. [BP04]
    R. Breu and G. Popp. Actor-centric modeling of user rights. In T. Margaria, editors. Fundamental Approaches to Software Engineering (FASE 2000), volume 2984 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York, 2004. Wermelinger and Margaria [WM04], pages 165–179.Google Scholar
  21. [JW01a]
    J. Jürjens and G. Wimmel. Formally testing fail-safety of electronic purse protocols. In 16th International Conference on Automated Software Engineering (ASE 2001), pages 408–411. IEEE Computer Society, New York, 2001.Google Scholar
  22. [JW02]
    J. Jürjens and G. Wimmel. Specification-based testing of firewalls. In D. Bjørner, M. Broy, and A. Zamulin, editors, Andrei Ershov 4th International Conference “Perspectives of System Informatics” (PSI 2001), volume 2244 of Lecture Notes in Computer Science, pages 308–316. Springer, Berlin Heidelberg New York, 2002.Google Scholar
  23. [WJ02]
    G. Wimmel and J. Jürjens. Specification-based test generation for security-critical systems using mutations. In International Conference on Formal Engineering Methods (ICFEM), volume 2495 of Lecture Notes in Computer Science, pages 471–482. Springer, Berlin Heidelberg New York, 2002.Google Scholar
  24. [DF93]
    J. Dick and A. Faivre. Automating the generation and sequencing of test cases from model-based specifications. In Formal Methods Europe (FME) 1993: Industrial-Strength Formal Methods, volume 670 of Lecture Notes in Computer Science, pages 268–284. Springer, Berlin Heidelberg New York, 1993.Google Scholar
  25. [PS97]
    J. Peleska and M. Siegel. Test automation of safety-critical reactive systems. South African Computer Jounal, 19:53–77, 1997.Google Scholar
  26. [HNS97]
    S. Helke, T. Neustupny, and T. Santen. Automating test case generation from Z specifications with Isabelle. In J. Bowen, M. Hinchey, and D. Till, editors, Proceedings of the Z Users Conference (ZUM 1997): The Z Formal Specification Notation, volume 1212 of Lecture Notes in Computer Science, pages 52–71. Springer, Berlin Heidelberg New York, 1997.Google Scholar
  27. [DBG01]
    J. Dushina, M. Benjamin, and D. Geist. Semi-Formal Test Generation with Genevieve. In 38th Design Automation Conference (DAC), pages 617–622. ACM, New York, 2001. Download at http://www.dac.com.Google Scholar
  28. [VM98]
    J. Voas and G. McGraw. Software Fault Injection: Inoculating Programs Against Errors. John Wiley & Sons, New York, 1998.Google Scholar
  29. [MH98]
    P. Malacaria and C. Hankin. Generalised flowcharts and games. Lecture Notes in Computer Science, 1443:363–--, 1998.Google Scholar
  30. [AGMO04]
    S. Abramsky, D. R. Ghica, A. S. Murawski, and C.-H. L. Ong. Applying game semantics to compositional software modeling and verification. In K. Jensen and A. Podelski, editors, 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004), volume 2988 of Lecture Notes in Computer Science, pages 421–435. Springer, Berlin Heidelberg New York, 2004.Google Scholar
  31. [CCG+03]
    [CCG+03]_S. Chaki, E. M. Clarke, A. Groce, S. Jha, and H. Veith. Modular verification of software components in C. In 25th International Conference on Software Engineering (ICSE 2003), pages 385–395. IEEE Computer Society, New York, 2003.Google Scholar
  32. [NPW02]
    T. Nipkow, L. C. Paulson, and M. Wenzel. Isabelle/HOL-A Proof Assistant for Higher-Order Logic. Springer, Berlin Heidelberg New York, 2002.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Personalised recommendations