Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows.
Clara BertolissiSilvio RanisePublished in: FroCos (2013)
Keyphrases
- high security
- expert systems
- security systems
- intelligent systems
- distributed systems
- intrusion detection
- retrieval systems
- critical infrastructure
- security requirements
- information security
- web services
- computer systems
- security issues
- access control
- data processing
- data management
- security measures
- wireless sensor networks
- information assurance
- automated verification