Login / Signup

A rigorous methodology for security architecture modeling and verification.

Yomna AliSherif El-Kassas
Published in: CSIIRW (2008)
Keyphrases
  • security architecture
  • access control
  • mathematical modeling
  • information systems
  • simulation platform
  • database
  • databases
  • data management
  • intrusion detection system
  • security model
  • insider threat