共 27 条
[2]
Abrial J.-R., 2010, MODELING EVENT B SYS, V1st
[4]
Anderson, 2003, extensible access control markup language (XACML) version 1.0
[5]
[Anonymous], 2004, Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, DOI [10.1145/1029133.1029140, DOI 10.1145/1029133.1029140]
[6]
Incremental Construction of Realizable Choreographies
[J].
NASA FORMAL METHODS, NFM 2018,
2018, 10811
:1-19
[8]
Heljanko K, 2006, LECT NOTES COMPUT SC, V4144, P95, DOI 10.1007/11817963_12
[9]
Hoang TS, 2009, SPECIFYING ACCESS CO, DOI [10.3929/ethz-a-006733720, DOI 10.3929/ETHZ-A-006733720]
[10]
Hu V.C., 2014, NIST Special Publication 800-30, V800, P1, DOI 10.6028/nist.sp.800-162