Formal Verification of the Security for Dual Connectivity in LTE.
Noamen Ben HendaKarl NorrmanKatharina PfefferPublished in: FormaliSE@ICSE (2015)
Keyphrases
- formal verification
- model checking
- symbolic model checking
- model checker
- information security
- bounded model checking
- automated verification
- cryptographic protocols
- access control
- intrusion detection
- security issues
- network security
- formal specification
- program slicing
- security requirements
- security policies
- internet access
- quality of service
- long term evolution
- fourth generation
- expert systems
- temporal logic
- state space