期刊文献+

形式化方法(FM) 被引量:2

Formal Method
在线阅读 下载PDF
导出
摘要 传统的开发方法一般基于自然语言的描述,不能表达明确的语义;本文介绍的形式化方法(FM)是基于形式逻辑和离散数学的,特别适用于安全重要性系统的说明、设计和构造。 t traditional develop methods based on natural language cannot express semantic details,In this paper,formal method based on formal logic and diverse mathematics is introduced,This method specifically appropriate to safetycritical system.
作者 杨红丽
出处 《西安邮电学院学报》 1999年第2期4-7,47,共5页 Journal of Xi'an Institute of Posts and Telecommunications
基金 原邮电部中青年科技基金
关键词 形式化方法 形式逻辑 离散数学 FM Formal method Formal logic Diverse mathematics
  • 相关文献

参考文献1

  • 1王兵山 等.离散数学[M].长沙:国防科技大学出版社,1995..

共引文献1

同被引文献23

  • 1高璇,刘烨,于冬.销售系统开发中两种需求建模方法的比较研究[J].现代情报,2004,24(7):209-213. 被引量:2
  • 2MA U,TSAI J J. Formal verification Techniques for Computer Communication Security Protocols. Handbook of Software Engineering and Knowledge Engineering[ S]. 2000.12 - 15.
  • 3Burrows M. A Logic of Cryptographic[J ]. ACM Transation Computer Systems, 1990,8 ( 1 ) : 18 - 36.
  • 4Burrows M,Abadi M,Needham R M. A Logic of Authentication[ R ]. Technical Report39, CANADA: DEC Systems Research Center, 1989.
  • 5Cui Baoqiu,Dong Yifei,Du Xiaoqun,et al. Logic Programming and Model Checking . Lecture Notes in Computer Science[Z].1998.
  • 6Oarke E,Emerson E A, Sisth A P. Automatic verification offinite- state concurrent systerm using temporal logic specification[ J ]. ACM Transactions on Programming Languages and Systems, 1986,8(2) :244 - 263.
  • 7Kindred D,Wing J M. Theory Generation for Security Protocols[EB/OL]. http://www - 2. cs. cmu. edu/afs/cs/project/calder/www/TG.html. 1999 - 06 - 16.
  • 8Daniel Amyot,Gunter Mussbacher, URN: Towards a New Standard for the Visual Description of Requirements, 1999
  • 9Emmanuel Letier, Reasoning about Agents in Goal-Oriented Requirements Engineering, UCL,2001.
  • 10琚川徽.基于i*和AlbertⅡ的需求建模框架研究.合肥工业大学,2002.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部