Tools for Traceable Security Verification.
Jan JürjensYijun YuAndreas BauerPublished in: BCS Int. Acad. Conf. (2008)
Keyphrases
- formal methods
- high security
- software tools
- cryptographic protocols
- integrity verification
- intrusion detection
- model checking
- java card
- computer security
- statistical databases
- security policies
- information security
- security management
- neural network
- access control
- security problems
- end users
- security threats
- protocol specification
- network services
- face verification
- user authentication
- functional requirements
- security requirements
- security issues
- network security
- distributed systems
- web services