Majd Zohri Yafi

Learn More
—We investigate intuitive claims made in security pattern catalogues using the formal language of Co-decharts and the Two-Tier Programming Toolkit. We analyse the Check Point pattern's structure and explore claims about conformance (of programs to the pattern), about consistency (between different catalogues), and about the relation between (security and(More)
Security design patterns are usually described using a variety of UML diagrams beside textual statements. Because, UML class diagrams are used to describe the structural aspects and UML sequence and/or activity diagrams are used to describe the behavioral aspects. So, when implementing, verifying, and/or detecting instances of those patterns, the issue of(More)
  • 1