An Assessment of Techniques for Proving Program Correctness
ACM Computing Surveys (CSUR)
Verification of Array, Record, and Pointer Operations in Pascal
ACM Transactions on Programming Languages and Systems (TOPLAS)
An Axiomatic Approach to Information Flow in Programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
Specification and verification of the UCLA Unix security kernel
Communications of the ACM
Proof techniques for hierarchically structured programs
Communications of the ACM
Abstract data types and software validation
Communications of the ACM
Certification of programs for secure information flow
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Security Kernel validation in practice
Communications of the ACM
A technique for software module specification with examples
Communications of the ACM
A note on the confinement problem
Communications of the ACM
An axiomatic basis for computer programming
Communications of the ACM
Principles of proving concurrent programs in Gypsy
POPL '79 Proceedings of the 6th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Verification of fairness in an implementation of monitors
ICSE '76 Proceedings of the 2nd international conference on Software engineering
Some extensions to algebraic specifications
Proceedings of an ACM conference on Language design for reliable software
Workshop on formal verification: (VERkshop)
ACM SIGSOFT Software Engineering Notes
m-EVES: A tool for verifying software
ICSE '88 Proceedings of the 10th international conference on Software engineering
Formal Verification of Fault Tolerance Using Theorem-Proving Techniques
IEEE Transactions on Computers
Toward special-purpose program verification
Conference proceedings on Formal methods in software development
Multi-level specification and verification of real-time software
ICSE '90 Proceedings of the 12th international conference on Software engineering
Multilevel specification of real time systems
Communications of the ACM - Special issue on software engineering
Security and privacy requirements in computing
ACM '86 Proceedings of 1986 ACM Fall joint computer conference
The Automation of Proof: A Historical and Sociological Exploration
IEEE Annals of the History of Computing
Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military
IEEE Annals of the History of Computing
Logic enhancement: A method for extending logic programming languages
LFP '82 Proceedings of the 1982 ACM symposium on LISP and functional programming
Reflections on the verification of the security of an operating system kernel
SOSP '83 Proceedings of the ninth ACM symposium on Operating systems principles
Applying flow-sensitive CQUAL to verify MINIX authorization check placement
Proceedings of the 2006 workshop on Programming languages and analysis for security
An overview of computer security
IBM Systems Journal
Dependable computing: concepts, limits, challenges
FTCS'95 Proceedings of the Twenty-Fifth international conference on Fault-tolerant computing
Hi-index | 0.00 |