References

  1. André Arnold, Gérald Point, Alain Griffault & Antoine Rauzy (1999): The AltaRica Formalism for Describing Concurrent Systems. Fundamenta Informaticae 40(2,3), pp. 109–124, doi:10.3233/FI-1999-402302. Available at http://iospress.metapress.com/content/W2506433232111V5.
  2. Julien Brunel, David Chemouil, Nicolas Mélédo & Vincent Ibanez (2014): Formal Modelling and Safety Analysis of an Avionic Functional Architecture with Alloy. In: Embedded Real Time Software and Systems (ERTSS 2014), Toulouse, France.
  3. Daniel Jackson (2006): Software Abstractions: Logic, Language, and Analysis. The MIT Press.
  4. Amerson Lin, Mike Bond & Jolyon Clulow (2010): Modeling Partial Attacks with Alloy. In: Bruce Christianson, Bruno Crispo, JamesA. Malcolm & Michael Roe: Security Protocols, Lecture Notes in Computer Science 5964. Springer Berlin Heidelberg, pp. 20–33. Available at http://dx.doi.org/10.1007/978-3-642-17773-6_4.
  5. MarkC. Reynolds (2010): Lightweight Modeling of Java Virtual Machine Security Constraints. In: Marc Frappier, Uwe Glässer, Sarfraz Khurshid, Régine Laleau & Steve Reeves: Abstract State Machines, Alloy, B and Z, Lecture Notes in Computer Science 5977. Springer Berlin Heidelberg, pp. 146–159. Available at http://dx.doi.org/10.1007/978-3-642-11811-1_12.
  6. M. Toahchoodee & I. Ray (2009): Using alloy to analyse a spatio-temporal access control model supporting delegation. Information Security, IET 3(3), pp. 75–113, doi:10.1049/iet-ifs.2008.0074.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org