Integrated Security Verification and Validation: Case Study.
Dorina GhindiciGilles GrimaudIsabelle Simplot-RylYanguo LiuIssa TraoréPublished in: LCN (2006)
Keyphrases
- case study
- high security
- java card
- integrity verification
- information security
- lessons learned
- security issues
- security problems
- intrusion detection
- information assurance
- cryptographic protocols
- security level
- security systems
- model checking
- real world
- high assurance
- software development
- security measures
- key management
- statistical databases
- formal methods
- security mechanisms
- face verification
- business process
- intrusion detection system
- security policies
- verification method
- rfid tags
- security requirements
- access control
- security properties
- functional requirements
- security model
- formal verification
- data security
- cyber security
- security protocols
- security analysis