Security policy validation using temporal executable specifications.
Jihène KrichèneMohamed HamdiNoureddine BoudrigaPublished in: SMC (2007)
Keyphrases
- security policies
- access control
- formal specification
- network security
- attribute grammars
- security concerns
- model based testing
- distributed systems
- network management
- security management
- access control systems
- security requirements
- control flow
- security architecture
- ubiquitous computing environments
- home network
- security measures
- concurrent systems
- unauthorized access
- access control policies
- ambient intelligence
- business process
- cloud computing