Login / Signup

Analysis and Run-Time Verification of Dynamic Security Policies.

Helge JanickeFrançois SieweKevin I. JonesAntonio CauHussein Zedan
Published in: DAMAS (2005)
Keyphrases
  • security policies
  • access control
  • real world
  • distributed systems