Author of the publication

Towards an Evolutionary Formal Software Development.

, and . ASE, page 417-420. IEEE Computer Society, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Similarities and Reuse of Proofs in Formal Software Verification., and . EWCBR, volume 1488 of Lecture Notes in Computer Science, page 76-87. Springer, (1998)Security of multi-agent systems: A case study on comparison shopping., , , and . J. Applied Logic, 5 (2): 303-332 (2007)Informationsflusskontrolle als Grundlage für die Sicherheit von Multi-Agenten-Systemen., , and . Praxis der Informationsverarbeitung und Kommunikation, 26 (1): 39-47 (2003)Proof Transformations for Evolutionary Formal Software Development., and . AMAST, volume 2422 of Lecture Notes in Computer Science, page 441-456. Springer, (2002)Exploiting Generic Aspects of Security Models in Formal Developments., and . Mechanizing Mathematical Reasoning, volume 2605 of Lecture Notes in Computer Science, page 452-475. Springer, (2005)System Description: inka 5.0 - A Logic Voyager., , , and . CADE, volume 1632 of Lecture Notes in Computer Science, page 207-211. Springer, (1999)A Pragmatic Approach to Reuse in Tactical Theorem Proving., , and . Electr. Notes Theor. Comput. Sci., 58 (2): 203-216 (2001)Towards an Evolutionary Formal Software-Development Using CASL., , , and . WADT, volume 1827 of Lecture Notes in Computer Science, page 73-88. Springer, (1999)The Development Graph Manager MAYA., , , and . AMAST, volume 2422 of Lecture Notes in Computer Science, page 495-501. Springer, (2002)Possibilistic Information Flow Control in the Presence of Encrypted Communication., and . ESORICS, volume 3193 of Lecture Notes in Computer Science, page 209-224. Springer, (2004)