Implementing a Verification Methodology for McCullough Security.
David RosenthalPublished in: CSFW (1989)
Keyphrases
- high security
- java card
- integrity verification
- intrusion detection
- security requirements
- model checking
- security issues
- cryptographic protocols
- security policies
- functional requirements
- information security
- network security
- computer security
- security management
- data mining
- security analysis
- security model
- smart card
- security problems
- security threats
- image encryption
- information assurance