|
Search the dblp DataBase
Achim D. Brucker:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Achim D. Brucker, Burkhart Wolff
Symbolic Test Case Generation for Primitive Recursive Functions. [Citation Graph (0, 0)][DBLP] FATES, 2004, pp:16-32 [Conf]
- Achim D. Brucker, Burkhart Wolff
Interactive Testing with HOL-TestGen. [Citation Graph (0, 0)][DBLP] FATES, 2005, pp:87-102 [Conf]
- Achim D. Brucker, Burkhart Wolff
Testing Distributed Component Based Systems Using UML/OCL. [Citation Graph (0, 0)][DBLP] GI Jahrestagung (1), 2001, pp:608-614 [Conf]
- Achim D. Brucker, Jürgen Doser, Burkhart Wolff
A Model Transformation Semantics and Analysis Methodology for SecureUML. [Citation Graph (0, 0)][DBLP] MoDELS, 2006, pp:306-320 [Conf]
- Achim D. Brucker, Burkhart Wolff
A Proposal for a Formal OCL Semantics in Isabelle/HOL. [Citation Graph (0, 0)][DBLP] TPHOLs, 2002, pp:99-114 [Conf]
- Achim D. Brucker, Burkhart Wolff
Using Theory Morphisms for Implementing Formal Methods Tools. [Citation Graph (0, 0)][DBLP] TYPES, 2002, pp:59-77 [Conf]
- Achim D. Brucker, Burkhart Wolff
HOL-OCL: Experiences, Consequences and Design Choices. [Citation Graph (0, 0)][DBLP] UML, 2002, pp:196-211 [Conf]
- Achim D. Brucker, Burkhart Wolff
A Case Study of a Formalized Security Architecture. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2003, v:80, n:, pp:- [Journal]
- Achim D. Brucker, Frank Rittinger, Burkhart Wolff
HOL-Z 2.0: A Proof Environment for Z-Specifications. [Citation Graph (0, 0)][DBLP] J. UCS, 2003, v:9, n:2, pp:152-172 [Journal]
- Achim D. Brucker, Burkhart Wolff
A verification approach to applied system security. [Citation Graph (0, 0)][DBLP] STTT, 2005, v:7, n:3, pp:233-247 [Journal]
- Achim D. Brucker, Burkhart Wolff
Test-Sequence Generation with Hol-TestGen with an Application to Firewall Testing. [Citation Graph (0, 0)][DBLP] TAP, 2007, pp:149-168 [Conf]
Information Flow in Disaster Management Systems. [Citation Graph (, )][DBLP]
Extensible Universes for Object-Oriented Data Models. [Citation Graph (, )][DBLP]
hol-TestGen. [Citation Graph (, )][DBLP]
HOL-OCL: A Formal Proof Environment for UML/OCL. [Citation Graph (, )][DBLP]
Integrating Automated and Interactive Protocol Verification. [Citation Graph (, )][DBLP]
Extending OCL with Null-References. [Citation Graph (, )][DBLP]
Delegation Assistance. [Citation Graph (, )][DBLP]
Model-Based Firewall Conformance Testing. [Citation Graph (, )][DBLP]
Extending access control models with break-glass. [Citation Graph (, )][DBLP]
Attribute-Based Encryption with Break-Glass. [Citation Graph (, )][DBLP]
Practical Issues with Formal Specifications - Lessons Learned from an Industrial Case Study. [Citation Graph (, )][DBLP]
Verified Firewall Policy Transformations for Test Case Generation. [Citation Graph (, )][DBLP]
ProActive Caching: Generating Caching Heuristics for Business Process Environments. [Citation Graph (, )][DBLP]
Idea: Efficient Evaluation of Access Control Constraints. [Citation Graph (, )][DBLP]
Semantics, calculi, and analysis for object-oriented specifications. [Citation Graph (, )][DBLP]
Verifying Test-Hypotheses: An Experiment in Test and Proof. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|