Login / Signup
A verification approach to applied system security.
Achim D. Brucker
Burkhart Wolff
Published in:
Int. J. Softw. Tools Technol. Transf. (2005)
Keyphrases
</>
model checking
information security
real time
data sets
databases
information retrieval
database systems
access control
formal verification
cryptographic protocols
security threats
verification method