


default search action
Formal Aspects of Computing, Volume 26
Volume 26, Number 1, January 2014
- Eerke A. Boiten
, Steve A. Schneider
:
Editorial. 1-2 - Giampaolo Bella
:
Inductive study of confidentiality: for everyone. 3-36 - James Heather, Steve A. Schneider
, Vanessa Teague:
Cryptographic protocols with everyday objects. 37-62 - Murat Moran
, James Heather, Steve A. Schneider
:
Verifying anonymity in voting systems using CSP. 63-98 - Matteo Avalle, Alfredo Pironti, Riccardo Sisto
:
Formal verification of security protocol implementations: a survey. 99-123 - Alfredo Pironti, Riccardo Sisto
:
Safe abstractions of data encodings in formal security protocol models. 125-167 - Thai Son Hoang, A. K. McIver
, Larissa Meinicke
, Carroll C. Morgan, Anthony Sloane
, E. Susatyo:
Abstractions of non-interference security: probabilistic versus possibilistic. 169-194
Volume 26, Number 2, March 2014
- Eerke A. Boiten, John Derrick
, Steve Reeves
:
Editorial. 195 - Luigia Petre, Elena Troubitsyna, Marina Waldén:
Kaisa Sere: In Memoriam. 197-201 - Maria Teresa Llano, Andrew Ireland, Alison Pease
:
Discovery of invariants through automated theory formation. 203-249 - Steve A. Schneider
, Helen Treharne
, Heike Wehrheim:
The behavioural semantics of Event-B refinement. 251-280 - Pontus Boström
, Fredrik Degerlund, Kaisa Sere, Marina Waldén:
Derivation of concurrent programs by stepwise scheduling of Event-B models. 281-303 - Eerke A. Boiten
:
Introducing extra operations in refinement. 305-317 - Richard Banach, Huibiao Zhu, Wen Su, Runlei Huang:
Continuous KAOS, ASM, and formal control system design across the continuous/discrete modeling interface: a simple train stopping application. 319-366 - Alvaro Miyazawa
, Ana Cavalcanti
:
Refinement-based verification of implementations of Stateflow charts. 367-405 - John Derrick
, Eerke A. Boiten
:
Relational concurrent refinement part III: traces, partial relations and automata. 407-432
Volume 26, Number 3, May 2014
- Cliff B. Jones
:
Editorial. 433 - Stephen Brookes, Peter W. O'Hearn, Uday S. Reddy:
The Essence of Reynolds. 435-439 - Sidney C. Nogueira, Augusto Sampaio, Alexandre Mota:
Test generation from state based use case models. 441-490 - Robert Colvin
:
An operational semantics for object-oriented concepts based on the class hierarchy. 491-535 - Muffy Calder
, Michele Sevegnani
:
Modelling IEEE 802.11 CSMA/CA RTS/CTS with stochastic bigraphs with sharing. 537-561 - Brijesh Dongol
, Ian J. Hayes
, Peter J. Robinson:
Reasoning about goal-directed real-time teleo-reactive programs. 563-589 - Manoj G. Dixit, S. Ramesh, Pallab Dasgupta:
Time-budgeting: a component based development methodology for real-time embedded systems. 591-621
Volume 26, Number 4, July 2014
- Xi Liu, Shaofa Yang, Jeff W. Sanders:
Compensation by design. 623-676 - Savas Konur, Michael Fisher
, Simon Dobson
, Stephen Knox:
Formal verification of a pervasive messaging system. 677-694 - Prahladavaradan Sampath:
An elementary theory of product-line variations. 695-727 - Jin Song Dong, Yang Liu
, Jun Sun
, Xian Zhang:
Towards verification of computation orchestration. 729-759 - Ferruccio Damiani
, Johan Dovland, Einar Broch Johnsen
, Ina Schaefer:
Verifying traits: an incremental proof system for fine-grained reuse. 761-793 - Ana Cavalcanti
, Steve King, Colin O'Halloran, Jim Woodcock
:
Test-data generation for control coverage by proof. 795-823 - Krishnendu Chatterjee, Vishwanath Raman:
Assume-guarantee synthesis for digital contract signing. 825-859
Volume 26, Number 5, September 2014
- Cliff B. Jones
:
Editorial. 861 - Andrzej Tarlecki
:
Władysław Marek Turski (1938-2013). 863-864 - Luís Cruz-Filipe
, Ivan Lanese, Francisco Martins
, António Ravara
, Vasco Thudichum Vasconcelos
:
The stream-based service-centred calculus: a foundation for service-oriented programming. 865-918 - Marc Frappier, Frédéric Gervais, Régine Laleau, Jérémy Milhau:
Refinement patterns for ASTDs. 919-941 - Yoriyuki Yamagata
, Weiqiang Kong, Akira Fukuda, Nguyen Van Tang, Hitoshi Ohsaki, Kenji Taguchi
:
A formal semantics of extended hierarchical state transition matrices using CSP#. 943-962 - Michael J. Banks, Jeremy L. Jacob:
On integrating confidentiality and functionality in a formal method. 963-992 - Martin P. Ward
, Hussein Zedan:
Provably correct derivation of algorithms using FermaT. 993-1031 - Rimvydas Ruksenas, Paul Curzon
, Ann Blandford
, Jonathan Back:
Combining human error verification and timing analysis: a case study on an infusion pump. 1033-1076
Volume 26, Number 6, November 2014
- Elvinia Riccobene
, Patrizia Scandurra
:
A formal framework for service modeling and prototyping. 1077-1113 - Alessandro Rossini, Juan de Lara, Esther Guerra
, Adrian Rutle, Uwe Wolter:
A formalisation of deep metamodelling. 1115-1152 - Canan Güniçen, Kemal Inan, Uraz Cengiz Türker, Hüsnü Yenigün:
The relation between preset distinguishing sequences and synchronizing sequences. 1153-1167 - Li Su
, Rodolfo Gómez, Howard Bowman:
Analysing neurobiological models using communicating automata. 1169-1204 - Matthias Daum, Nelson Billing, Gerwin Klein
:
Concerned with the unprivileged: user programs in kernel refinement. 1205-1229 - Nicolas Wu
, Andrew C. Simpson
:
Formal relational database design: an exercise in extending the formal template language. 1231-1269

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.