The security pi-calculus and non-interference.
Matthew HennessyPublished in: J. Log. Algebraic Methods Program. (2005)
Keyphrases
- intrusion detection
- access control
- security mechanisms
- information security
- security requirements
- security measures
- security systems
- network security
- multipath
- computer security
- security policies
- security level
- neural network
- security vulnerabilities
- security threats
- computer algebra
- security properties
- wireless mesh networks
- security model
- cyber security
- security analysis
- functional requirements
- statistical databases
- computer systems
- data mining