Security Verification of Low-Trust Architectures.
Qinhan TanYonathan FissehaShibo ChenLauren BiernackiJean-Baptiste JeanninSharad MalikTodd M. AustinPublished in: CoRR (2023)
Keyphrases
- high security
- java card
- security services
- integrity verification
- cryptographic protocols
- trust management
- security issues
- trusted computing
- information security
- trust relationships
- model checking
- trust model
- intrusion detection
- security requirements
- access control
- public key infrastructure
- statistical databases
- security policies
- formal verification
- security protocols
- security threats
- security analysis
- trust negotiation
- high assurance
- protocol specification
- signature verification
- functional requirements
- privacy concerns
- verification method
- trust evaluation
- distributed systems
- policy enforcement