


default search action
Formal Aspects of Computing, Volume 26
Volume 26, Number 1, January 2014
- Eerke A. Boiten

, Steve A. Schneider
:
Editorial. 1-2 - Giampaolo Bella

:
Inductive study of confidentiality: for everyone. 3-36 - James Heather, Steve A. Schneider

, Vanessa Teague:
Cryptographic protocols with everyday objects. 37-62 - Murat Moran

, James Heather, Steve A. Schneider
:
Verifying anonymity in voting systems using CSP. 63-98 - Matteo Avalle, Alfredo Pironti, Riccardo Sisto

:
Formal verification of security protocol implementations: a survey. 99-123 - Alfredo Pironti, Riccardo Sisto

:
Safe abstractions of data encodings in formal security protocol models. 125-167 - Thai Son Hoang, A. K. McIver

, Larissa Meinicke
, Carroll C. Morgan, Anthony Sloane
, E. Susatyo:
Abstractions of non-interference security: probabilistic versus possibilistic. 169-194
Volume 26, Number 2, March 2014
- Eerke A. Boiten, John Derrick

, Steve Reeves
:
Editorial. 195 - Luigia Petre, Elena Troubitsyna, Marina Waldén:

Kaisa Sere: In Memoriam. 197-201 - Maria Teresa Llano, Andrew Ireland, Alison Pease

:
Discovery of invariants through automated theory formation. 203-249 - Steve A. Schneider

, Helen Treharne
, Heike Wehrheim:
The behavioural semantics of Event-B refinement. 251-280 - Pontus Boström

, Fredrik Degerlund, Kaisa Sere, Marina Waldén:
Derivation of concurrent programs by stepwise scheduling of Event-B models. 281-303 - Eerke A. Boiten

:
Introducing extra operations in refinement. 305-317 - Richard Banach

, Huibiao Zhu, Wen Su, Runlei Huang:
Continuous KAOS, ASM, and formal control system design across the continuous/discrete modeling interface: a simple train stopping application. 319-366 - Alvaro Miyazawa

, Ana Cavalcanti
:
Refinement-based verification of implementations of Stateflow charts. 367-405 - John Derrick

, Eerke A. Boiten
:
Relational concurrent refinement part III: traces, partial relations and automata. 407-432
Volume 26, Number 3, May 2014
- Cliff B. Jones

:
Editorial. 433 - Stephen Brookes, Peter W. O'Hearn, Uday S. Reddy:

The Essence of Reynolds. 435-439 - Sidney C. Nogueira, Augusto Sampaio, Alexandre Mota:

Test generation from state based use case models. 441-490 - Robert Colvin

:
An operational semantics for object-oriented concepts based on the class hierarchy. 491-535 - Muffy Calder

, Michele Sevegnani
:
Modelling IEEE 802.11 CSMA/CA RTS/CTS with stochastic bigraphs with sharing. 537-561 - Brijesh Dongol

, Ian J. Hayes
, Peter J. Robinson:
Reasoning about goal-directed real-time teleo-reactive programs. 563-589 - Manoj G. Dixit, S. Ramesh, Pallab Dasgupta:

Time-budgeting: a component based development methodology for real-time embedded systems. 591-621
Volume 26, Number 4, July 2014
- Xi Liu, Shaofa Yang, Jeff W. Sanders:

Compensation by design. 623-676 - Savas Konur, Michael Fisher

, Simon Dobson
, Stephen Knox:
Formal verification of a pervasive messaging system. 677-694 - Prahladavaradan Sampath:

An elementary theory of product-line variations. 695-727 - Jin Song Dong, Yang Liu

, Jun Sun
, Xian Zhang:
Towards verification of computation orchestration. 729-759 - Ferruccio Damiani

, Johan Dovland, Einar Broch Johnsen
, Ina Schaefer:
Verifying traits: an incremental proof system for fine-grained reuse. 761-793 - Ana Cavalcanti

, Steve King, Colin O'Halloran
, Jim Woodcock
:
Test-data generation for control coverage by proof. 795-823 - Krishnendu Chatterjee, Vishwanath Raman:

Assume-guarantee synthesis for digital contract signing. 825-859
Volume 26, Number 5, September 2014
- Cliff B. Jones

:
Editorial. 861 - Andrzej Tarlecki

:
Władysław Marek Turski (1938-2013). 863-864 - Luís Cruz-Filipe

, Ivan Lanese, Francisco Martins
, António Ravara
, Vasco Thudichum Vasconcelos
:
The stream-based service-centred calculus: a foundation for service-oriented programming. 865-918 - Marc Frappier, Frédéric Gervais, Régine Laleau, Jérémy Milhau:

Refinement patterns for ASTDs. 919-941 - Yoriyuki Yamagata

, Weiqiang Kong, Akira Fukuda, Nguyen Van Tang, Hitoshi Ohsaki, Kenji Taguchi
:
A formal semantics of extended hierarchical state transition matrices using CSP#. 943-962 - Michael J. Banks, Jeremy L. Jacob:

On integrating confidentiality and functionality in a formal method. 963-992 - Martin P. Ward

, Hussein Zedan:
Provably correct derivation of algorithms using FermaT. 993-1031 - Rimvydas Ruksenas, Paul Curzon

, Ann Blandford
, Jonathan Back:
Combining human error verification and timing analysis: a case study on an infusion pump. 1033-1076
Volume 26, Number 6, November 2014
- Elvinia Riccobene

, Patrizia Scandurra
:
A formal framework for service modeling and prototyping. 1077-1113 - Alessandro Rossini, Juan de Lara, Esther Guerra

, Adrian Rutle, Uwe Wolter:
A formalisation of deep metamodelling. 1115-1152 - Canan Güniçen, Kemal Inan, Uraz Cengiz Türker, Hüsnü Yenigün:

The relation between preset distinguishing sequences and synchronizing sequences. 1153-1167 - Li Su

, Rodolfo Gómez, Howard Bowman:
Analysing neurobiological models using communicating automata. 1169-1204 - Matthias Daum, Nelson Billing, Gerwin Klein

:
Concerned with the unprivileged: user programs in kernel refinement. 1205-1229 - Nicolas Wu

, Andrew C. Simpson
:
Formal relational database design: an exercise in extending the formal template language. 1231-1269

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














