Applying a Theory of Modules and Interfaces to Security Verification.
Simon S. LamA. Udaya ShankarThomas Y. C. WooPublished in: IEEE Symposium on Security and Privacy (1991)
Keyphrases
- high security
- java card
- integrity verification
- information security
- access control
- theoretical framework
- user interface
- functional modules
- security systems
- general theory
- computer security
- face verification
- network security
- building blocks
- formal methods
- authentication protocol
- user authentication
- intrusion detection
- database