Author of the publication

Formal Modelling of Data Integration Systems Security Policies.

, , , , and . Data Science and Engineering, 1 (3): 139-148 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Modelling of Data Integration Systems Security Policies., , , , and . Data Science and Engineering, 1 (3): 139-148 (2016)A Systematic Approach to Atomicity Decomposition in Event-B., , and . SEFM, volume 7504 of Lecture Notes in Computer Science, page 78-93. Springer, (2012)Applying Atomicity and Model Decomposition to a Space Craft System in Event-B., , and . NASA Formal Methods, volume 6617 of Lecture Notes in Computer Science, page 328-342. Springer, (2011)Building Traceable Event-B Models from Requirements., , , and . Electron. Commun. Eur. Assoc. Softw. Sci. Technol., (2013)Validating and verifying the requirements and design of a haemodialysis machine using the Rodin toolset., , , , and . Sci. Comput. Program., (2018)Verifiable Code Generation from Scheduled Event-B Models., , , and . ABZ, volume 10817 of Lecture Notes in Computer Science, page 234-248. Springer, (2018)Building traceable Event-B models from requirements., , , and . Sci. Comput. Program., (2015)Towards Automatic Code Generation of Run-Time Power Management for Embedded Systems Using Formal Methods., , , , and . MCSoC, page 104-111. IEEE, (2015)An approach to atomicity decomposition in the Event-B formal method.. University of Southampton, UK, (2012)British Library, EThOS.Evaluation of Graphical Control Flow Management Approaches for Event-B Modelling., , and . ECEASST, (2013)