An efficient security verification method for programs with stack inspection.
Naoya NittaYoshiaki TakataHiroyuki SekiPublished in: CCS (2001)
Keyphrases
- verification method
- model checking
- temporal logic
- access control
- security requirements
- information assurance
- security level
- security systems
- information security
- security mechanisms
- statistical databases
- security issues
- security management
- data sets
- security problems
- computer security
- network security
- intrusion detection
- information systems
- quality control
- human operators
- functional requirements
- operating system
- social networks
- data mining
- neural network
- real time