Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
13
views
17
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,741
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Information Security and Privacy
Validation of UML and OCL Models by Automatic Snapshot Generation
other
Author(s):
Martin Gogolla
,
Jörn Bohling
,
Mark Richters
Publication date
(Print):
2003
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Global Health Next Generation Network
Most cited references
17
Record
: found
Abstract
: not found
Book Chapter
: not found
Generating Tests from UML Specifications
Jeff Offutt
,
Aynur Abdurazik
(1999)
0
comments
Cited
12
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Validating UML Models and OCL Constraints
Mark Richters
,
Martin Gogolla
(2000)
0
comments
Cited
11
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
On Formalizing the UML Object Constraint Language OCL
Mark Richters
,
Martin Gogolla
(1998)
0
comments
Cited
8
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2003
Pages
: 265-279
DOI:
10.1007/978-3-540-45221-8_23
SO-VID:
96ee9130-3cea-4f16-8030-16f3e311bc2b
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 6
Efficient Reachability Set Generation and Storage Using Decision Diagrams
pp. 22
K-12 Computer Science: Aspirations, Realities, and Challenges
pp. 60
Overview of the WikipediaMM Task at ImageCLEF 2009
pp. 97
Bookkeeping for Informal Workers: Co-creating with Street Traders
pp. 97
Impossible Differential Attacks on Reduced-Round LBlock
pp. 112
An Implementation of Bitsliced DES on the Pentium MMXTM Processor
pp. 129
Coping with Nondeterminism in Network Protocol Testing
pp. 120
Conformant Planning as a Case Study of Incremental QBF Solving
pp. 65
The Shuttle Radar Topography Mission
pp. 93
Learning Human Cognition via fMRI Analysis Using 3D CNN and Graph Neural Network
pp. 202
Concurrent clean
pp. 173
Ordered tableaux: Extensions and applications
pp. 203
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy
pp. 504
On the semantics of fair parallelism
pp. 262
A Type Theoretic Framework for Formal Metamodelling
pp. 321
Objectives of the British Standardisation of a language to support the Vienna development method
pp. 519
On the One-Per-Message Unforgeability of (EC)DSA and Its Variants
pp. 252
The TPTP problem library
pp. 279
QianLi: A Modular System for Connecting Distant Family Members Through Tacit Interaction
pp. 250
Testing AMQP Protocol on Unstable and Mobile Networks
pp. 265
Validation of UML and OCL Models by Automatic Snapshot Generation
pp. 260
Building an Ecosystem for the Tyrolean Tourism Knowledge Graph
pp. 670
On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs
pp. 370
A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack
pp. 669
Termination of Rewriting with Strategy Annotations
pp. 522
A Hybrid Particle Swarm Optimization Algorithm Based on Space Transformation Search and a Modified Velocity Model
pp. 751
Performance Optimization for Large Scale Computing: The Scalable VAMPIR Approach
pp. 632
Towards a Dynamic Data Driven Application System for Wildfire Simulation
pp. 689
Simulation and Visualization of Air Flow Around Bat Wings During Flight
Similar content
5,741
Thermodynamics of OHgX, XHgOH, XHgOCl, XHgOBr, and HOHgY Gaseous Oxidized Mercury Molecules from Isodesmic, Isogyric, and Atomization Work Reactions (X = Halogen, Y = OH, OCl, OBr)
Authors:
Francisco Guzman
,
Joseph Bozzelli
From UML/OCL to SBVR specifications: A challenging transformation
Authors:
Jordi Cabot
,
Raquel Pau
,
Ruth Raventós
Oxidative cleavage of α-diols, α-diones, α-hydroxy-ketones and α-hydroxy- and α-keto acids with calcium hypochlorite [Ca(OCl)2].
Authors:
Philip M. Keehn
,
Stephen Nwaukwa
See all similar
Cited by
4
Reasoning on UML Class Diagrams with OCL Constraints
Authors:
Anna Queralt
,
Ernest Teniente
A Research Agenda for Conceptual Schema-Centric Development
Authors:
Antoni Olivé
,
Jordi Cabot
Specification and Validation of Authorisation Constraints Using UML and OCL
Authors:
Karsten Sohr
,
Gail-Joon Ahn
,
Martin Gogolla
…
See all cited by