2010 | ||
---|---|---|
86 | Nina Moebius, Kurt Stenzel, Wolfgang Reif: Formal Verification of Application-Specific Security Properties in a Model-Driven Approach. ESSoS 2010: 166-181 | |
2009 | ||
85 | Wolfgang Reif, Guojun Wang, Jadwiga Indulska: Autonomic and Trusted Computing, 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings Springer 2009 | |
84 | Nina Moebius, Kurt Stenzel, Holger Grandy, Wolfgang Reif: SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. ARES 2009: 841-846 | |
83 | Florian Nafz, Frank Ortmeier, Hella Seebach, Jan-Philipp Steghöfer, Wolfgang Reif: A Universal Self-Organization Mechanism for Role-Based Organic Computing Systems. ATC 2009: 17-31 | |
82 | Nina Moebius, Kurt Stenzel, Holger Grandy, Wolfgang Reif: Model-Driven Code Generation for Secure Smart Card Applications. Australian Software Engineering Conference 2009: 44-53 | |
81 | Andreas Schierl, Gerhard Schellhorn, Dominik Haneberg, Wolfgang Reif: Abstract Specification of the UBIFS File System for Flash Memory. FM 2009: 190-206 | |
80 | Alwin Hoffmann, Andreas Angerer, Frank Ortmeier, Michael Vistein, Wolfgang Reif: Hiding real-time: A new approach for the software development of industrial robots. IROS 2009: 2108-2113 | |
79 | Michael Vistein, Frank Ortmeier, Wolfgang Reif, Ralf Huuck, Ansgar Fehnker: An Abstract Specification Language for Static Program Analysis. Electr. Notes Theor. Comput. Sci. 254: 181-197 (2009) | |
2008 | ||
78 | Kurt Stenzel, Holger Grandy, Wolfgang Reif: Verification of Java Programs with Generics. AMAST 2008: 315-329 | |
77 | Andriy Dunets, Gerhard Schellhorn, Wolfgang Reif: Automating Algebraic Specifications of Non-freely Generated Data Types. ATVA 2008: 141-155 | |
76 | Holger Grandy, Markus Bischof, Kurt Stenzel, Gerhard Schellhorn, Wolfgang Reif: Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code. FM 2008: 165-180 | |
75 | Florian Nafz, Frank Ortmeier, Hella Seebach, Wolfgang Reif: Organic Computing for Health Care Systems - Possible Benefits and Challenges. HEALTHINF (2) 2008: 286-290 | |
74 | Michael Balser, Simon Bäumler, Wolfgang Reif, Gerhard Schellhorn: Interactive Verification of Concurrent Systems using Symbolic Execution. LPAR Workshops 2008 | |
73 | Matthias Güdemann, Florian Nafz, Frank Ortmeier, Hella Seebach, Wolfgang Reif: A Specification and Construction Paradigm for Organic Computing Systems. SASO 2008: 233-242 | |
72 | Andriy Dunets, Gerhard Schellhorn, Wolfgang Reif: Bounded Relational Analysis of Free Data Types. TAP 2008: 99-115 | |
71 | Simon Bäumler, Florian Nafz, Michael Balser, Wolfgang Reif: Compositional Proofs with Symbolic Execution. VERIFY 2008 | |
70 | Dominik Haneberg, Gerhard Schellhorn, Holger Grandy, Wolfgang Reif: Verification of Mondex electronic purses with KIV: from transactions to a security protocol. Formal Asp. Comput. 20(1): 41-59 (2008) | |
2007 | ||
69 | Holger Grandy, Kurt Stenzel, Wolfgang Reif: A Refinement Method for Java Programs. FMOODS 2007: 221-235 | |
68 | Nina Moebius, Dominik Haneberg, Wolfgang Reif, Gerhard Schellhorn: A Modeling Framework for the Development of Provably Secure E-Commerce Applications. ICSEA 2007: 8 | |
67 | Hella Seebach, Frank Ortmeier, Wolfgang Reif: Design and construction of organic computing systems. IEEE Congress on Evolutionary Computation 2007: 4215-4221 | |
66 | Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn: Verifying Smart Card Applications: An ASM Approach. IFM 2007: 313-332 | |
65 | Matthias Güdemann, Andreas Angerer, Frank Ortmeier, Wolfgang Reif: Modeling of self-adaptive systems with SCADE. ISCAS 2007: 2922-2925 | |
64 | Matthias Güdemann, Frank Ortmeier, Wolfgang Reif: Using Deductive Cause-Consequence Analysis (DCCA) with SCADE. SAFECOMP 2007: 465-478 | |
63 | Holger Grandy, Robert Bertossi, Kurt Stenzel, Wolfgang Reif: ASN1-light: A Verified Message Encoding for Security Protocols. SEFM 2007: 195-204 | |
62 | Frank Ortmeier, Wolfgang Reif, Giovanna Di Marzo Serugendo, Hartmut Schmeck: WG2: Software engineering for organic computing applications (SE4OC). Software Engineering 2007: 275-276 | |
2006 | ||
61 | Matthias Güdemann, Frank Ortmeier, Wolfgang Reif: Formal Modeling and Verification of Systems with Self-x Properties. ATC 2006: 38-47 | |
60 | Holger Grandy, Dominik Haneberg, Wolfgang Reif, Kurt Stenzel: Developing Provable Secure M-Commerce Applications. ETRICS 2006: 115-129 | |
59 | Gerhard Schellhorn, Holger Grandy, Dominik Haneberg, Wolfgang Reif: The Mondex Challenge: Machine Checked Proofs for an Electronic Purse. FM 2006: 16-31 | |
58 | Jonathan Schmitt, Alwin Hoffmann, Michael Balser, Wolfgang Reif, Mar Marcos: Interactive Verification of Medical Guidelines. FM 2006: 32-47 | |
57 | Matthias Güdemann, Florian Nafz, Wolfgang Reif, Hella Seebach: Towards Safe and Secure Organic Computing Applications. GI Jahrestagung (1) 2006: 153-160 | |
56 | Matthias Güdemann, Frank Ortmeier, Wolfgang Reif: Safety and Dependability Analysis of Self-Adaptive Systems. ISoLA 2006: 177-184 | |
55 | Simon Bäumler, Michael Balser, Andriy Dunets, Wolfgang Reif, Jonathan Schmitt: Verification of Medical Guidelines by Model Checking - A Case Study. SPIN 2006: 219-233 | |
54 | Annette ten Teije, Mar Marcos, Michael Balser, Joyce van Croonenborg, Christoph Duelli, Frank van Harmelen, Peter J. F. Lucas, Silvia Miksch, Wolfgang Reif, Kitty Rosenbrand, Andreas Seyfang: Improving medical protocols by formal methods. Artificial Intelligence in Medicine 36(3): 193-209 (2006) | |
2005 | ||
53 | Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn: Verifying Security Protocols: An ASM Approach. Abstract State Machines 2005: 247-262 | |
52 | Frank Ortmeier, Wolfgang Reif, Gerhard Schellhorn: Formal Safety Analysis of a Radio-Based Railroad Crossing Using Deductive Cause-Consequence Analysis (DCCA). EDCC 2005: 210-224 | |
51 | Holger Grandy, Kurt Stenzel, Wolfgang Reif: Object Oriented Verification Kernels for Secure Java Applications. SEFM 2005: 170-179 | |
2004 | ||
50 | Hartmut Ehrig, Werner Damm, Jörg Desel, Martin Große-Rhode, Wolfgang Reif, Eckehard Schnieder, Engelbert Westkämper: Integration of Software Specification Techniques for Applications in Engineering, Priority Program SoftSpez of the German Research Foundation (DFG), Final Report Springer 2004 | |
49 | Frank Ortmeier, Wolfgang Reif: Safety Optimization: A Combination of Fault Tree Analysis and Optimization Techniques. DSN 2004: 651-658 | |
48 | Dominik Haneberg, Wolfgang Reif, Kurt Stenzel: A Construction Kit for Modeling the Security of M-commerce Applications. FORTE Workshops 2004: 72-85 | |
47 | Michael Balser, Simon Bäumler, Alexander Knapp, Wolfgang Reif, Andreas Thums: Interactive Verification of UML State Machines. ICFEM 2004: 434-448 | |
46 | Wolfgang Reif, Frank Ortmeier, Andreas Thums, Gerhard Schellhorn: Integrated formal methods for safety analysis of train systems. IFIP Congress Topical Sessions 2004: 637-642 | |
45 | Andreas Thums, Gerhard Schellhorn, Frank Ortmeier, Wolfgang Reif: Interactive Verification of Statecharts. SoftSpez Final Report 2004: 355-373 | |
44 | Frank Ortmeier, Wolfgang Reif, Gerhard Schellhorn: Introduction to Subject Area "Verification". SoftSpez Final Report 2004: 419-422 | |
43 | Frank Ortmeier, Andreas Thums, Gerhard Schellhorn, Wolfgang Reif: Combining Formal Methods and Safety Analysis - The ForMoSA Approach. SoftSpez Final Report 2004: 474-493 | |
42 | Dominik Haneberg, Kurt Stenzel, Wolfgang Reif: Electronic-Onboard-Ticketing: Software Challenges of an State-of-the-Art M-Commerce Application. Workshop Mobile Commerce 2004: 103-113 | |
2003 | ||
41 | Dominik Haneberg, Alexander Kreibich, Wolfgang Reif, Kurt Stenzel: Design for Trust: Security im M-Commerce. GI Jahrestagung (1) 2003: 91-94 | |
40 | Rudolf Berghammer, Dominik Haneberg, Wolfgang Reif, Gerhard Schellhorn: Special Issue on Tools for System Design and Verification. J. UCS 9(2): 86-87 (2003) | |
2002 | ||
39 | Dominik Haneberg, Wolfgang Reif, Kurt Stenzel: A Method for Secure Smartcard Applications. AMAST 2002: 319-333 | |
38 | Frank Ortmeier, Gerhard Schellhorn, Andreas Thums, Wolfgang Reif, Bernhard Hering, Helmut Trappschuh: Safety Analysis of the Height Control System for the Elbtunnel. SAFECOMP 2002: 296-308 | |
37 | Michael Balser, Christoph Duelli, Wolfgang Reif, Gerhard Schellhorn: Verifying Concurrent Systems with Symbolic Execution. J. Log. Comput. 12(4): 549-560 (2002) | |
36 | Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll: Verified Formal Security Models for Multiapplicative Smart Cards. Journal of Computer Security 10(4): 339-368 (2002) | |
2001 | ||
35 | Wolfgang Reif, Gerhard Schellhorn, Andreas Thums: Flaw Detection in Formal Specifications. IJCAR 2001: 642-657 | |
34 | Wolfgang Reif, Gerhard Schellhorn: J.UCS Special Issue on Tools for System Design and Verification - Part 1. J. UCS 7(1): 1-2 (2001) | |
33 | Wolfgang Reif, Gerhard Schellhorn: J.UCS Special Issue on Tools for System Design and Verification - Part 2. J. UCS 7(2): 105-106 (2001) | |
32 | Wolfgang Reif, Gerhard Schellhorn, Tobias Vollmer, Jürgen Ruf: Correctness of Efficient Real-Time Model Checking. J. UCS 7(2): 194-209 (2001) | |
2000 | ||
31 | Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll: Verification of a Formal Security Model for Multiapplicative Smart Cards. ESORICS 2000: 17-36 | |
30 | Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel, Andreas Thums: Formal System Development with KIV. FASE 2000: 363-366 | |
29 | Wolfgang Reif, Jürgen Ruf, Gerhard Schellhorn, Tobias Vollmer: Do You Trust Your Model Checker? FMCAD 2000: 179-196 | |
1999 | ||
28 | Wolfgang Reif: Formale Methoden für sicherheitskritische Software - Der KIV-Ansatz. Inform., Forsch. Entwickl. 14(4): 193-202 (1999) | |
27 | Reiner Hähnle, Wolfram Menzel, Peter H. Schmitt, Wolfgang Reif: J.UCS Special Issue on Integration of Deduction Systems. J. UCS 5(3): (1999) | |
1998 | ||
26 | Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: KIV 3.0 for Provably Correct Systems. FM-Trends 1998: 330-337 | |
25 | Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: VSE: Controlling the Complexity in Formal Software Developments. FM-Trends 1998: 351-358 | |
24 | Wolfgang Reif: Interaktives Theorembeweisen und seine Anwendungen in der Softwaretechnik. KI 12(4): 42-48 (1998) | |
1997 | ||
23 | Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: Proving System Correctness with KIV 3.0. CADE 1997: 69-72 | |
22 | Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: Proving System Correctness with KIV. TAPSOFT 1997: 859-862 | |
1995 | ||
21 | Wolfgang Reif: The KIV-Approach to Software Verification. KORSO Book 1995: 339-370 | |
20 | Thomas Fuchß, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: Three Selected Case Studies in Verification. KORSO Book 1995: 371-387 | |
1994 | ||
19 | Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: Formal Specification and Verification Using KIV. FTRTFT 1994: 787-787 | |
18 | Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel: Tactics in KIV. Elektronische Informationsverarbeitung und Kybernetik 30(5/6): 293-310 (1994) | |
1993 | ||
17 | Wolfgang Reif, Kurt Stenzel: Reuse of Proofs in Software Verification. FSTTCS 1993: 284-293 | |
16 | Wolfgang Reif: An Approach to Parameterized First-Order Specifications: Semantics, Correctness, Parameter Passing. Formal Methods in Programming and Their Applications 1993: 67-80 | |
15 | Heinrich Hußmann, Jacques Loeckx, Wolfgang Reif: KORSO: Das Verbundprojekt "Korrekte Software". GI Jahrestagung 1993: 266-271 | |
14 | Rainer Drexler, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel, Werner Stephan, Andreas Wolpers: The KIV System: A Tool for Formal Program Development. STACS 1993: 704-705 | |
13 | Markus Ullmann, H. Hauff, D. Loevenich, P. Kejwal, R. Förster, P. Baur, Wolfgang Reif, Werner Stephan, Andreas Wolpers, Jürgen Cleve, Dieter Hutter, Claus Sengler, E. Canver: VSE Verification Support Environment: Ein Werkzeug zur Entwicklung vertrauenswürdiger und zuverlässiger Systeme in Anlehnung an gültige Sicherheitskriterien. VIS 1993: 175-190 | |
1992 | ||
12 | Wolfgang Reif: The KIV System: Systematic Construction of Verified Software. CADE 1992: 753-757 | |
11 | Wolfgang Reif: Verification of Large Software Systems. FSTTCS 1992: 241-252 | |
10 | Wolfgang Reif: Correctness of Generic Modules. LFCS 1992: 406-417 | |
9 | Wolfgang Reif: Correctness of Full First-Order Specifications. SEKE 1992: 276-283 | |
1990 | ||
8 | Maritta Heisel, Wolfgang Reif, Werner Stephan: Tactical Theorem Proving in Program Verification. CADE 1990: 117-131 | |
1989 | ||
7 | Maritta Heisel, Wolfgang Reif, Werner Stephan: Machine-Assisted Program Construction and Modification. GWAI 1989: 338-347 | |
6 | Maritta Heisel, Wolfgang Reif, Werner Stephan: A Dynamic Logic for Program Verification. Logic at Botik 1989: 134-145 | |
1988 | ||
5 | Maritta Heisel, Wolfgang Reif, Werner Stephan: Implementing Verification Strategies in the KIV-System. CADE 1988: 131-140 | |
4 | Maritta Heisel, Wolfgang Reif: Bericht über den Workshop ``Logik und Wissensrepräsentation''. KI 2(3): 15-17 (1988) | |
1987 | ||
3 | Maritta Heisel, Wolfgang Reif, Werner Stephan: Program Verification Using Dynamic Logic. CSL 1987: 102-117 | |
2 | Maritta Heisel, Wolfgang Reif, Werner Stephan: Program Verification by Symbolic Execution and Induction. GWAI 1987: 201-210 | |
1986 | ||
1 | Reiner Hähnle, Maritta Heisel, Wolfgang Reif, Werner Stephan: An Interactive Verification System Based on Dynamic Logic. CADE 1986: 306-315 |