Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository., , and . ICECCS, page 290-298. IEEE Computer Society, (2007)A formal security policy for xenon., and . FMSE, page 43-52. ACM, (2008)A Methodology for Protocol Verification Applied to EMV® 1., , and . SBMF, volume 11254 of Lecture Notes in Computer Science, page 180-197. Springer, (2018)Taking Our Own Medicine: Applying the Refinement Calculus to State-Rich Refinement Model Checking., , and . ICFEM, volume 4260 of Lecture Notes in Computer Science, page 697-716. Springer, (2006)A Chain Datatype in Z., and . Int. J. Software and Informatics, 3 (2-3): 357-374 (2009)POSIX file store in Z/Eves: An experiment in the verified software repository., , and . Sci. Comput. Program., 74 (4): 238-257 (2009)Formal techniques in the safety analysis of software components of a new dialysis machine., , , , , , and . Sci. Comput. Program., (2019)CZT Support for Z Extensions., , , and . IFM, volume 3771 of Lecture Notes in Computer Science, page 227-245. Springer, (2005)Safety Analysis of Software Components of a Dialysis Machine Using Model Checking., , , , , , and . FACS, volume 10487 of Lecture Notes in Computer Science, page 137-154. Springer, (2017)VDM at Large: Modelling the EMV® 2^nd 2 nd Generation Kernel.. SBMF, volume 11254 of Lecture Notes in Computer Science, page 109-125. Springer, (2018)