Author:
Bauer Andreas,Jürjens Jan
Subject
Law,General Computer Science
Reference53 articles.
1. A calculus for cryptographic protocols: the Spi calculus;Abadi,1997
2. Prudent engineering practice for cryptographic protocols;Abadi;IEEE Transactions on Software Engineering,1996
3. Model-driven security engineering for trust management in SECTET;Alam;Journal of Software,2007
4. Defining liveness;Alpern,1984
5. Recognizing safety and liveness;Alpern;Distributed Computing,1987
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. RVsec: Towards a Comprehensive Technology Stack for Secure Deployment of Software Monitors;Proceedings of the 7th ACM International Workshop on Verification and Monitoring at Runtime Execution;2024-09-13
2. Runtime Verification for Trustworthy Computing;Electronic Proceedings in Theoretical Computer Science;2023-09-30
3. A modular pipeline for enforcement of security properties at runtime;Annals of Telecommunications;2023-04-17
4. RV-TEE-Based Trustworthy Secure Shell Deployment: An Empirical Evaluation.;The Journal of Object Technology;2022
5. Runtime verification for trustworthy secure shell deployment;Proceedings of the 5th ACM International Workshop on Verification and mOnitoring at Runtime EXecution;2021-07-11