Login / Signup

A survey on the use of access permission-based specifications for program verification.

Ayesha SadiqYuan-Fang LiSea Ling
Published in: J. Syst. Softw. (2020)
Keyphrases
  • access control
  • role based access control
  • high level
  • real time
  • real world
  • search engine
  • database systems
  • data management
  • security policies
  • finite state machines
  • formal specification
  • functional requirements