[1]
I. G. Kim, “Formal Verification of Security Model Using SPR Tool”, Comput. Inform., vol. 25, no. 5, pp. 353–368, Jan. 2012.