The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Achim D. Brucker: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Achim D. Brucker, Burkhart Wolff
    Symbolic Test Case Generation for Primitive Recursive Functions. [Citation Graph (0, 0)][DBLP]
    FATES, 2004, pp:16-32 [Conf]
  2. Achim D. Brucker, Burkhart Wolff
    Interactive Testing with HOL-TestGen. [Citation Graph (0, 0)][DBLP]
    FATES, 2005, pp:87-102 [Conf]
  3. Achim D. Brucker, Burkhart Wolff
    Testing Distributed Component Based Systems Using UML/OCL. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2001, pp:608-614 [Conf]
  4. Achim D. Brucker, Jürgen Doser, Burkhart Wolff
    A Model Transformation Semantics and Analysis Methodology for SecureUML. [Citation Graph (0, 0)][DBLP]
    MoDELS, 2006, pp:306-320 [Conf]
  5. Achim D. Brucker, Burkhart Wolff
    A Proposal for a Formal OCL Semantics in Isabelle/HOL. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 2002, pp:99-114 [Conf]
  6. Achim D. Brucker, Burkhart Wolff
    Using Theory Morphisms for Implementing Formal Methods Tools. [Citation Graph (0, 0)][DBLP]
    TYPES, 2002, pp:59-77 [Conf]
  7. Achim D. Brucker, Burkhart Wolff
    HOL-OCL: Experiences, Consequences and Design Choices. [Citation Graph (0, 0)][DBLP]
    UML, 2002, pp:196-211 [Conf]
  8. Achim D. Brucker, Burkhart Wolff
    A Case Study of a Formalized Security Architecture. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2003, v:80, n:, pp:- [Journal]
  9. Achim D. Brucker, Frank Rittinger, Burkhart Wolff
    HOL-Z 2.0: A Proof Environment for Z-Specifications. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2003, v:9, n:2, pp:152-172 [Journal]
  10. Achim D. Brucker, Burkhart Wolff
    A verification approach to applied system security. [Citation Graph (0, 0)][DBLP]
    STTT, 2005, v:7, n:3, pp:233-247 [Journal]
  11. Achim D. Brucker, Burkhart Wolff
    Test-Sequence Generation with Hol-TestGen with an Application to Firewall Testing. [Citation Graph (0, 0)][DBLP]
    TAP, 2007, pp:149-168 [Conf]

  12. Information Flow in Disaster Management Systems. [Citation Graph (, )][DBLP]


  13. Extensible Universes for Object-Oriented Data Models. [Citation Graph (, )][DBLP]


  14. hol-TestGen. [Citation Graph (, )][DBLP]


  15. HOL-OCL: A Formal Proof Environment for UML/OCL. [Citation Graph (, )][DBLP]


  16. Integrating Automated and Interactive Protocol Verification. [Citation Graph (, )][DBLP]


  17. Extending OCL with Null-References. [Citation Graph (, )][DBLP]


  18. Delegation Assistance. [Citation Graph (, )][DBLP]


  19. Model-Based Firewall Conformance Testing. [Citation Graph (, )][DBLP]


  20. Extending access control models with break-glass. [Citation Graph (, )][DBLP]


  21. Attribute-Based Encryption with Break-Glass. [Citation Graph (, )][DBLP]


  22. Practical Issues with Formal Specifications - Lessons Learned from an Industrial Case Study. [Citation Graph (, )][DBLP]


  23. Verified Firewall Policy Transformations for Test Case Generation. [Citation Graph (, )][DBLP]


  24. ProActive Caching: Generating Caching Heuristics for Business Process Environments. [Citation Graph (, )][DBLP]


  25. Idea: Efficient Evaluation of Access Control Constraints. [Citation Graph (, )][DBLP]


  26. Semantics, calculi, and analysis for object-oriented specifications. [Citation Graph (, )][DBLP]


  27. Verifying Test-Hypotheses: An Experiment in Test and Proof. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002