References
- D.E. Bell and L.J. LaPadula, Secure computer systems: Mathematical foundations, Tech. Rep. 2547, Vol. I, MITRE Corporation, Bedford, MA, USA, 1973.
- K. Claessen, M. Johansson, D. Rosen, and N. Smallbone, HipSpec: Automating inductive proofs of program properties, in Workshop on Automated Theory Exploration at 6th International Conference on Automated Reasoning (IJCAR), Lecture Notes in Computer Science/Lecture Notes in Artificial Intelligence, Vol. LNAI 7364B, Gramlich, D. Miller, U. Sattler, eds., Springer, Edinburgh, 2012, pp. 16–25. Available at http://web.student.chalmers.se/danr/hipspec-atx.pdf.
- V. D'Silva, D. Kroening, and G. Weissenbacher, A survey of automated techniques for formal software verification, IEEE Trans. CAD Integr. Circuits Syst. 27(7) (2008), pp. 1165–1178. doi: 10.1109/TCAD.2008.923410
- L. Freitas, Formalising workflows partitioning over federated clouds, Tech. Rep., Newcastle University, Newcastle Upon Tyne, 2011.
- L. Freitas and C.B. Jones, Learning from an expert's proof: AI4FM, in UV10 (Usable Verification), Redmond, WA, T. Ball, L. Zuck, and N. Shankar, eds., November 2010. Available at http://fm.csl.sri.com/UV10/submissions/uv2010_submission_18.pdf.
- L. Freitas and J. Woodcock, Proving Theorems about jml Classes, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 4700, Springer, Berlin, 2007, pp. 255–279 (cited by (since 1996) 3; Conference of Festschrift Symposium – Formal Methods and Hybrid Real-Time Systems. In Honour of Dines Bjorner and Zhou Chaochen on the Occasion of their 70th Birthdays; Conference Date: 24–27 September 2007; Conference Code: 71178).
- E.K. Jackson and W. Shulte, Synthesis of cloud applications using logic programming: BAM!, Tech. Rep., Microsoft Research, Redmond, WA, 2008. Available at http://research.microsoft.com/apps/pubs/default.aspx?id=77370
- M. Leuschel and M. Butler, ProB: An automated analysis toolset for the B method, J. Softw. Tools Technol. Transf. 10(2) (2008), pp. 185–203. doi: 10.1007/s10009-007-0063-9
- P. Missier, S. Soiland-Reyes, S. Owen, W. Tan, A. Nenadic, I. Dunlop, A. Williams, T. Oinn, C. Goble, M. Gertz, T. Hey, and B. Ludaescher, Taverna, reloaded, in SSDBM 2010, Heidelberg, Germany, M. Gertz, T. Hey, and B. Ludaescher, eds., 2010. Available at http://www.taverna.org.uk/pages/wp-content/uploads/2010/04/T2Architecture.pdf.
- L.C. Paulson, Isabelle: A Generic Theorem Prover, Lecture Notes in Computer Science, Vol. 828, Springer, Berlin, 1994.
- M. Saaltink, The Z/EVES system, in ZUM ’97: The Z Formal Specification Notation, Lecture Notes in Computer Science, Vol. 1212, J. Bowen, M. Hinchey, and D. Till, eds., Springer, Berlin, 1997, pp. 72–85.
- P. Watson, A multi-level security model for partitioning workflows over federated clouds, 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Greece, 2011.
- P. Watson, A multi-level security model for partitioning workflows over federated clouds, J. Cloud Comput. Adv. Syst. Appl. 1(15) (2012), pp. 1–15.
- P. Watson, H.G. Hiden, and S. Woodman, e-Science Central for CARMEN: Science as a service, Concurrency Comput. Pract. Exp. 22(17) (2010), pp. 2369–2380. doi: 10.1002/cpe.1611
- J. Woodcock and J. Davies, Using Z, Prentice Hall, London, 1996.