Login / Signup
Validation of security policies by the animation of Z specifications.
Yves Ledru
Nafees Qamar
Akram Idani
Jean-Luc Richier
Mohamed-Amine Labiadh
Published in:
SACMAT (2011)
Keyphrases
</>
security policies
access control
model based testing
network security
security management
security concerns
distributed systems
access control systems
computer graphics
security requirements
access control policies
data management
fine grained
data mining
knowledge management
cyber attacks
object oriented