Z and/in HOL
- 035 Security Modelling in Z and HOL
- 038 Problems with Z
- 041 translating Z into HOL
- 042 Recursive Data Types in HOL
- 043 "rbj contribution" NOV/DEC 86
- 044 Security Properties in Z and in HOL
- 045 Secure System Design in Z and in HOL
- 051 Recursive datatypes in HOL (temp extensions)
- 052 Recursive datatypes in HOL
- 054 presentation at Cambridge Computer Labs
- 086 Z and HOL
- 109 presentation to CESG
- 125 understanding Z notes
- 126 understanding Z review
- 127 Oxford presentation
- 131 Formal Methods (a note)
- 159 presentation to APRIL 89 compusec meeting
- 169 ICL HOL (for HOL user meeting 89)
- 170 compusec FEB 90
- 175 IED ZHOL presentation
- 176 Z concrete syntax
- 178 ZHOL presentation (II)
- 180 remarks on the semantics of Z
- 181 review of Diller
- 182 Z semantics and proof FM forum presentation
- 183 security modelling and formal methods tools
- 185 Z - semantics, rules, tools - an update
- 189 Comments on Z standard
- 192 a security proof using the ICL Z proof tool
- 195 ProofPower
- 196 FST exploitation (presentation)
- 197 Cambridge (May 14 presentation)
- 198 HOL version of BCS FACS paper
© Roger Bishop Jones created 1/7/95 modified 22/12/95