Implementation and Verification of Programmable Security.
Stephen MagillBradley SkaggsMauricio PapaJohn HalePublished in: DBSec (2002)
Keyphrases
- high security
- cryptographic protocols
- low cost
- intrusion detection
- efficient implementation
- java card
- security systems
- integrity verification
- protocol specification
- hardware implementation
- cyber security
- computer security
- security level
- security mechanisms
- security issues
- security problems
- information assurance
- information security
- model checking