Applying Formal Methods to an Information Security Device: An Experience Report.
James Kirby Jr.Myla ArcherConstance L. HeitmeyerPublished in: HASE (1999)
Keyphrases
- information security
- formal methods
- countermeasures
- security issues
- formal analysis
- model checking
- knowledge based systems
- information systems
- intrusion detection
- safety critical
- formal specification
- smart card
- network security
- artificial intelligence
- software engineering
- security level
- information security management
- security requirements
- e government
- smart grid
- security risks
- information assurance
- cyber defense
- intrusion detection system
- data acquisition
- knowledge acquisition
- low cost
- relational databases
- knowledge base
- development lifecycle