Login / Signup
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines.
Wissam Mallouli
Amel Mammar
Ana R. Cavalli
Published in:
DS-RT (2008)
Keyphrases
</>
finite state machines
model checking
finite state automata
derivation rules
regular expressions
information security
hidden markov models
digital circuits
metadata
intrusion detection
database
access control