Login / Signup

A verification approach to applied system security.

Achim D. BruckerBurkhart Wolff
Published in: Int. J. Softw. Tools Technol. Transf. (2005)
Keyphrases
  • model checking
  • information security
  • real time
  • data sets
  • databases
  • information retrieval
  • database systems
  • access control
  • formal verification
  • cryptographic protocols
  • security threats
  • verification method