Using Yourdon and Z: an Approach to Formal Specification
Proceedings of the Fifth Annual Z User Meeting on Z User Workshop
Proceedings of the Z User Workshop
Structured Analysis - A Draft Method for Writing Z Specifications
Proceedings of the Z User Workshop
Formal Specifications as Reusable Frameworks
VDM '90 Proceedings of the Third International Symposium of VDM Europe on VDM and Z - Formal Methods in Software Development
Formal Specification in Metamorphic Programing
VDM '91 Proceedings of the 4th International Symposium of VDM Europe on Formal Software Development-Volume I: Conference Contributions - Volume I
Formal methods: state of the art and future directions
ACM Computing Surveys (CSUR) - Special ACM 50th-anniversary issue: strategic directions in computing research
A practical approach to security assessment
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Action Systems for Security Specification
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
A review of information security issues and respective research contributions
ACM SIGMIS Database
Experimental comparison of attack trees and misuse cases for security threat identification
Information and Software Technology
Validation of security-design models using Z
ICFEM'11 Proceedings of the 13th international conference on Formal methods and software engineering
Comparison of policy specification languages for access control
Proceedings of the CUBE International Information Technology Conference
Comparing attack trees and misuse cases in an industrial setting
Information and Software Technology
Hi-index | 0.00 |
This paper describes the development of a formal security policy model in Z for the NATO Air Command and Control System (ACCS): a large, distributed, multilevel-secure system. The model was subject to manual validation, and some of the issues and lessons in both writing and validating the model are discussed.