Login / Signup
A survey on the use of access permission-based specifications for program verification.
Ayesha Sadiq
Yuan-Fang Li
Sea Ling
Published in:
J. Syst. Softw. (2020)
Keyphrases
</>
access control
role based access control
high level
real time
real world
search engine
database systems
data management
security policies
finite state machines
formal specification
functional requirements