Information-flow and data-flow analysis of while-programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
The Z notation: a reference manual
The Z notation: a reference manual
Object-oriented development: the fusion method
Object-oriented development: the fusion method
Mastering the requirements process
Mastering the requirements process
Certification of programs for secure information flow
Communications of the ACM
Smart Card Security and Applications, Second Edition
Smart Card Security and Applications, Second Edition
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Is Proof More Cost-Effective Than Testing?
IEEE Transactions on Software Engineering
RE '01 Proceedings of the Fifth IEEE International Symposium on Requirements Engineering
IEEE Software
DPS: An Architectural Style for Development of Secure Software
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Correctness by Construction: Integrating Formality into a Commercial Development Process
FME '02 Proceedings of the International Symposium of Formal Methods Europe on Formal Methods - Getting IT Right
Static verification and extreme programming
Proceedings of the 2003 annual ACM SIGAda international conference on Ada: the engineering of correct and reliable software for real-time & distributed systems using ada and related technologies
Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report
IEEE Security and Privacy
Enforcing security and safety models with an information flow analysis tool
Proceedings of the 2004 annual ACM SIGAda international conference on Ada: The engineering of correct and reliable software for real-time & distributed systems using Ada and related technologies
Sound methods and effective tools for model-based security engineering with UML
Proceedings of the 27th international conference on Software engineering
Correctness by construction: a manifesto for high integrity software
SCS '05 Proceedings of the 10th Australian workshop on Safety critical systems and software - Volume 55
Access control and audit model for the multidimensional modeling of data warehouses
Decision Support Systems
Developing secure data warehouses with a UML extension
Information Systems
On the Secure Software Development Process: CLASP and SDL Compared
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Verified component-based software in SPARK: experimental results for a missile guidance system
Proceedings of the 2007 ACM international conference on SIGAda annual international conference
Cooperative reasoning for automatic software verification
Proceedings of the second workshop on Automated formal methods
Tool Integration for Reasoned Programming
Verified Software: Theories, Tools, Experiments
Experimental comparison of attack trees and misuse cases for security threat identification
Information and Software Technology
On the secure software development process: CLASP, SDL and Touchpoints compared
Information and Software Technology
Formal methods: Practice and experience
ACM Computing Surveys (CSUR)
Information and Software Technology
Santa Claus: Formal analysis of a process-oriented solution
ACM Transactions on Programming Languages and Systems (TOPLAS)
The verifying compiler: a grand challenge for computing research
CC'03 Proceedings of the 12th international conference on Compiler construction
On the quality of navigation models with content-modification operations
ICWE'07 Proceedings of the 7th international conference on Web engineering
The beautification process in model-driven engineering of user interfaces
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction
Communications of the ACM
The rise, fall and persistence of Ada
Proceedings of the ACM SIGAda annual international conference on SIGAda
Formal modelling of separation kernel components
ICTAC'10 Proceedings of the 7th International colloquium conference on Theoretical aspects of computing
Towards a MOF/QVT-Based domain architecture for model driven security
MoDELS'06 Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems
Realizing model driven security for inter-organizational workflows with WS-CDL and UML 2.0
MoDELS'05 Proceedings of the 8th international conference on Model Driven Engineering Languages and Systems
Model driven security for inter-organizational workflows in e-government
TCGOV'05 Proceedings of the 2005 international conference on E-Government: towards Electronic Democracy
Generating a Petri net from a CSP specification: A semantics-based method
Advances in Engineering Software
Advances in Software Engineering
Source code as the key artifact in requirement-based development: the case of ada 2012
Ada-Europe'12 Proceedings of the 17th Ada-Europe international conference on Reliable Software Technologies
Testing with inputs and outputs in CSP
FASE'13 Proceedings of the 16th international conference on Fundamental Approaches to Software Engineering
Translation of Z specifications to executable code: Application to the database domain
Information and Software Technology
Comparing attack trees and misuse cases in an industrial setting
Information and Software Technology
Hi-index | 0.02 |
Praxis Critical Systems recently developed a secure certification authority for smart cards that had to satisfy performance and usability requirements while meeting stringent security constraints. The authors used a systematic process from requirements elicitation through formal specification, user interface prototyping, rigorous design, and coding to ensure these objectives' achievement. They show how a process that achieves normal commercial productivity can deliver a highly reliable system that meets all its throughput and us-ability goals.