Login / Signup

Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines.

Wissam MallouliAmel MammarAna R. Cavalli
Published in: DS-RT (2008)
Keyphrases
  • finite state machines
  • model checking
  • finite state automata
  • derivation rules
  • regular expressions
  • information security
  • hidden markov models
  • digital circuits
  • metadata
  • intrusion detection
  • database
  • access control