Login / Signup
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis.
Alexandre Vernotte
Pontus Johnson
Mathias Ekstedt
Robert Lagerström
Published in:
EDOC Workshops (2017)
Keyphrases
</>
security analysis
smart card
high security
public key
security requirements
encryption scheme
image encryption
security properties
encryption algorithm
security model
user authentication
authentication scheme
databases
intelligent agents
operating system
similarity measure
information systems