From Complex Specifications to a Working Prototype. A Protocol Engineering Case Study
FME '01 Proceedings of the International Symposium of Formal Methods Europe on Formal Methods for Increasing Software Productivity
Designing Hypermedia Documentation for Safety Critical Applications
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Wireless protocol testing and validation supported by formal methods: a hands-on report
Journal of Systems and Software - Special issue: Software engineering education and training
Which security policy for multiplication smart cards?
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
A security evaluation approach for information systems in telecommunication enterprises
Enterprise Information Systems
Hi-index | 0.00 |
We describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally modelled and proven consistent with the functional specifications by means of an interactive theorem prover. The formalisms were used to assist in the design of the security architecture.