Load Time Security Verification.
Olga GadyatskayaEduardo LostalFabio MassacciPublished in: ICISS (2011)
Keyphrases
- high security
- information security
- java card
- integrity verification
- access control
- intrusion detection
- cryptographic protocols
- security issues
- model checking
- security threats
- security requirements
- security problems
- load balancing
- information assurance
- security level
- security analysis
- security management
- high assurance
- formal verification
- formal analysis
- statistical databases
- security policies
- network security
- smart card
- anomaly detection
- user authentication
- elliptic curve
- cyber security
- key management
- countermeasures
- protocol specification