H
Hui Shen
Researcher at University of Texas at San Antonio
Publications - 9
Citations - 51
Hui Shen is an academic researcher from University of Texas at San Antonio. The author has contributed to research in topics: Sequence diagram & Unified Modeling Language. The author has an hindex of 4, co-authored 9 publications receiving 51 citations.
Papers
More filters
Proceedings ArticleDOI
Formalize UML 2 Sequence Diagrams
TL;DR: This paper adapts the previously developed template semantics to formalize the structured control constructs of sequence diagrams to express concurrent message exchanges in UML 2.
Proceedings ArticleDOI
Characterizations and boundaries of security requirements patterns
TL;DR: This work examines an existing general pattern format that describes how security patterns should be structured and comparing it to existing security requirements patterns, and proposes a defining format that can reduce user effort in elicitation and specification of security requirementspatterns.
A formal framework for analyzing sequence diagram
Jianwei Niu,Hui Shen +1 more
TL;DR: This dissertation introduces an approach to codify the semantics of Sequence Diagrams with Combined Fragments in terms of Linear Temporal Logic (LTL) templates, and develops tools to translate Sequence diagrams to both LTL and NuSMV's input language to demonstrate that they can be automatically verified.
Formal Analysis of Sequence Diagram with Combined Fragments
TL;DR: In this article, an approach to formally describe Sequence Diagrams with Combined Fragments in terms of the input language of the model checker NuSMV is presented. This approach permits the verification of desired properties against sequence diagrams.
Journal ArticleDOI
Sequence Diagram Aided Privacy Policy Specification
TL;DR: This paper proposes UML sequence diagrams as a practical means to graphically express privacy policies by leveraging the analytical powers of automated decision procedures for LTL formulas to determine if a collection of sequence diagrams is consistent, independent, etc and also to verify if a system design conforms to the privacy policies.