An Approach to Increasing the Automation of the Verification of Security.
David RosenthalPublished in: CSFW (1988)
Keyphrases
- high security
- information security
- java card
- integrity verification
- industrial automation
- cryptographic protocols
- access control
- security issues
- security requirements
- information assurance
- security threats
- data security
- human operators
- network security
- sensitive data
- face verification
- security policies
- asynchronous circuits
- security measures
- model checking
- privacy preserving
- high assurance
- protocol specification
- intrusion detection