Automated verification of security pattern compositions.
Jing DongTu PengYajing ZhaoPublished in: Inf. Softw. Technol. (2010)
Keyphrases
- automated verification
- model checking
- formal verification
- automated reasoning
- pattern matching
- security patterns
- information security
- access control
- network security
- intrusion detection
- security systems
- security requirements
- statistical databases
- security issues
- security analysis
- security policies
- pattern discovery
- temporal logic
- neural network
- functional requirements
- cyber security
- security mechanisms
- key management
- computer security
- security problems
- expert systems
- optimal solution