There is an increasing emphasis on the use of software to control safety critical plants for a wide area of applications. The importance of ensuring the correct operation of such potentially hazardous systems points to an emphasis on the verification of the system relative to a suitably secure specification. However, the process of verification is often made more complex by the concurrency and real-time considerations which are inherent in many applications. A response to this is the use of formal methods for the specification and verification of safety critical control systems. These provide a mathematical representation of a system which permits reasoning about its properties. This thesis investigates the use of the formal method Communic...
This paper presents a general approach for analysis and verification of authentication properties us...
Clarke et al. (1986) have developed a model-based verification method and have applied it to validat...
This paper presents a general approach for analysis and verification of authentication properties in...
[[abstract]]With the rapid growth of networking and high-computing power, the demand for large-scale...
Model checking is an automatic formal verification technique for establishing correctness of systems...
. In this article, we describe an approach for the tool-supported development and verification of fa...
This paper presents in a nutshell a procedure for producing formally verified concurrent software. T...
This work proposes and demonstrates a novel method for software development that applies formal veri...
This thesis develops a verification theory for systems of parallel processes communicating with one...
Many of the systems that we rely on, and interact with on a daily basis, are driven by software. Unf...
For software development projects with very high correctness requirements (including safety requirem...
En este trabajo se propone una nueva tècnica para la verificación de programas concurrentes. Para re...
Software design techniques for tolerating both hardware and software faults have been developed over...
Studying industrial systems by simulation enables the designer to study the dynamic behaviour and to...
Security properties such as confidentiality and authenticity may be considered in terms of the flow ...
This paper presents a general approach for analysis and verification of authentication properties us...
Clarke et al. (1986) have developed a model-based verification method and have applied it to validat...
This paper presents a general approach for analysis and verification of authentication properties in...
[[abstract]]With the rapid growth of networking and high-computing power, the demand for large-scale...
Model checking is an automatic formal verification technique for establishing correctness of systems...
. In this article, we describe an approach for the tool-supported development and verification of fa...
This paper presents in a nutshell a procedure for producing formally verified concurrent software. T...
This work proposes and demonstrates a novel method for software development that applies formal veri...
This thesis develops a verification theory for systems of parallel processes communicating with one...
Many of the systems that we rely on, and interact with on a daily basis, are driven by software. Unf...
For software development projects with very high correctness requirements (including safety requirem...
En este trabajo se propone una nueva tècnica para la verificación de programas concurrentes. Para re...
Software design techniques for tolerating both hardware and software faults have been developed over...
Studying industrial systems by simulation enables the designer to study the dynamic behaviour and to...
Security properties such as confidentiality and authenticity may be considered in terms of the flow ...
This paper presents a general approach for analysis and verification of authentication properties us...
Clarke et al. (1986) have developed a model-based verification method and have applied it to validat...
This paper presents a general approach for analysis and verification of authentication properties in...