Using formal methods for security in the Xenon project.
John P. McDermottLeo FreitasPublished in: CSIIRW (2010)
Keyphrases
- formal methods
- security properties
- development lifecycle
- formal specification
- knowledge based systems
- model checking
- formal analysis
- software engineering
- process algebra
- information security
- safety critical
- model checker
- security requirements
- intrusion detection
- security issues
- artificial intelligence
- provably correct
- case study
- security analysis
- security policies
- reactive systems
- access control
- software development
- protocol specification
- formal specification language
- key management
- modeling language
- cryptographic protocols
- network security
- data quality
- knowledge acquisition