
By Achim D. Brucker and Burkhart Wolff.
Further Reading: This presentation is based on the following publication: A. D. Brucker and B. Wolff, “A case study of a formalized security architecture,” Electronic Notes in Theoretical Computer Science, vol. 80, pp. 24–40, 2003, doi: 10.1016/S1571-0661(04)80807-7. Proceedings of the Eighth International Workshop on Formal Methods for Industrial Critical Systems (FMICS’03). Author copy: http://logicalhacking.com/publications/brucker.ea-case-2003/
Please cite this work as follows: A. D. Brucker and B. Wolff, “A case study of a formalized security architecture.” Røros, Norway, Jun. 05, 2003. Author copy: http://logicalhacking.com/publications/talk-brucker.ea-case-2003/
@Misc{ talk:brucker.ea:case:2003,
date = {2003-06-05},
author = {Achim D. Brucker and Burkhart Wolff},
lecturer = {Achim D. Brucker},
title = {A Case Study of a Formalized Security Architecture},
event = {FMICS 2003},
address = {R{\o}ros, Norway},
month = {jun},
language = {USenglish},
day = {5},
year = {2003},
note = {Author copy: \url{http://logicalhacking.com/publications/talk-brucker.ea-case-2003/}},
}