Login / Signup

An Approach to Verifying Security and Timing Properties in UML Models.

Vidhi ThapaEunjee SongHanil Kim
Published in: ICECCS (2010)
Keyphrases
  • uml models
  • network security
  • object oriented
  • intrusion detection
  • information security
  • security protocols
  • security properties
  • data structure
  • image classification
  • access control
  • security requirements