Login / Signup
Automated verification of role-based access control security models recovered from dynamic web applications.
Manar H. Alalfi
James R. Cordy
Thomas R. Dean
Published in:
WSE (2012)
Keyphrases
</>
web applications
role based access control
access control
automated verification
application development
dynamic content
web services
data security
application developers
end users
security policies
statistical databases
databases
intrusion detection
automated reasoning