2009 Fourth International Conference on Software Engineering Advances 2009
DOI: 10.1109/icsea.2009.22
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Formal Methods with Model-Driven Engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…Although it is recognized that the security of cryptographic primitives is guaranteed by the use of state-of-the-art cryptographic algorithms (such as the Rivest-Shamir-Adleman (RSA) public key cryptosystem and Secure Hash Algorithm 2 (SHA-2), the security of the remaining aspects must be carefully analysed [13]. Thus, to develop highintegrity systems in which security attributes are important, the researcher needs to prove the defined secrecy features formally [14], [15]. Indeed, a formal method approach assists designers and users to analyse and verify the proposed system at any point in the system life cycle [16].…”
Section: Introductionmentioning
confidence: 99%
“…Although it is recognized that the security of cryptographic primitives is guaranteed by the use of state-of-the-art cryptographic algorithms (such as the Rivest-Shamir-Adleman (RSA) public key cryptosystem and Secure Hash Algorithm 2 (SHA-2), the security of the remaining aspects must be carefully analysed [13]. Thus, to develop highintegrity systems in which security attributes are important, the researcher needs to prove the defined secrecy features formally [14], [15]. Indeed, a formal method approach assists designers and users to analyse and verify the proposed system at any point in the system life cycle [16].…”
Section: Introductionmentioning
confidence: 99%