On the Specification, Validation and Verification of Security in Access Control Systems.
Greg O'SheaPublished in: Comput. J. (1994)
Keyphrases
- access control systems
- security policies
- access control
- formal verification
- asynchronous circuits
- protocol specification
- access control policies
- network security
- formal methods
- model checking
- high security
- security requirements
- network management
- data security
- access control mechanism
- integrity verification
- intelligent systems
- role based access control
- intrusion detection system
- access rights
- fine grained