Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Langenstein, Bruno"'
Autor:
Koop, Frank, Ullmann, Markus, Wittmann, Stefan, Hutter, Dieter, Langenstein, Bruno, Sengler, Claus, Stephan, Werner, Wolpers, Andreas, Reif, Wolfgang
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3341::98832baac82529f4ece7e62e6410415b
https://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/60756
https://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/60756
Autor:
Schmaltz, Julien, Blasum, Holger, Langenstein, Bruno, Leconte, Betrand, Müller, Kevin, Verbeek, Freek, Koolen, Ruud
To achieve security certification according to the highest levels of assurance, formal models and proofs of security properties are required. In the MILS context, this includes formalisation of key components – such as separation kernels – and th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74c8d933b4748f88478f8b8c9cb2d506
Autor:
Blasum, Holger, Havle, Oto, Tverdyshev, Sergey, Langenstein, Bruno, Stephan, Werner, Feliachi, Abderrahmane, Nemouchi, Yakoub, Wolff, Burkhart, Proch, Cyril, Verbeek, Freek, Schmaltz, Julien
This document consists of three chapters: Chapter 1 describes how Isabelle/HOL works and how to use it in a certification processnbsp;in a sound way./li> li>Chapter 2: Style Guide. It describes how to write Isabelle theories so that they are suitable
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7ec3b05a869f6b683fb6d0bd4f1e6d29
Autor:
Hutter, Dieter1, Langenstein, Bruno1, Rock, Georg1, Siekmann, Jörg H.1, Stephan, Werner1, Vogt, Roland1
Publikováno v:
Journal of Experimental & Theoretical Artificial Intelligence. Oct-Dec2000, Vol. 12 Issue 4, p383-406. 24p. 1 Color Photograph, 10 Diagrams.
Autor:
Wolff, Burkhart, Nemouchi, Yakoub, Feliachi, Abderrahmane, Tverdyshev, Sergey, Havle, Oto, Blasum, Holger, Langenstein, Bruno, Stephan, Werner, Proch, Cyril, Verbeek, Freek, Schmaltz, Julien
This document consists of four parts: Part I gives an overview over formal automated test-generation techniques developed in the EURO-MILS project. This contains a chapter on new methodologies as well as a chapter on implemented techniques in HOL-Tes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fcb9aa13f6a27186c9421c71f468769d
Autor:
Tverdyshev, Sergey, Blasum, Holger, Langenstein, Bruno, Maebe, Jonas, De Sutter, Bjorn, Leconte, Bertrand, Triquet, Benoît, Müller, Kevin, Paulitsch, Michael, Söding-Freiherr von Blomberg, Axel, Tillequin, Axel
We introduce a generic description of MILS systems (Chapter 2), and the MILS architecture template (Chapter 3). Chapter 4 discusses MILS main components. The practical aim of this document is two-fold: (1) to get a common understanding of MILS terms
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::648ea0e802a3f280e48b131c61dba728
We present the integration of the refinement method of the VSE verification tool, successfully used in industrial applications, in the Heterogeneous Tool Set Hets. The connection is done via introducing the dynamic logic underlying VSE and two logic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::61a643405958bccf7cc15024ef81f524
Verisoft XT was a three-year research project , funded by the German Federal Ministry of Education and Research (BMBF). The main goal of the project was the pervasive formal verification of computer systems. One of its sub-projects examined the appli
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::ed98191826f623e010a6982d30822d43
https://hal.archives-ouvertes.fr/hal-02189912
https://hal.archives-ouvertes.fr/hal-02189912
Autor:
Verbeek, Freek, Havle, Oto, Schmaltz, Julien, Tverdyshev, Sergey, Blasum, Holger, Langenstein, Bruno, Stephan, Werner, Wolff, Burkhart, Nemouchi, Yakoub
Publikováno v:
NASA Formal Methods 7th International Symposium, NFM 2015, Pasadena, CA, USA, April 27-29, 2015, Proceedings; 2015, p375-389, 15p
Publikováno v:
Computer Safety, Reliability & Security: 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014. Proceedings; 2014, p246-261, 16p