Formal Verification of Security Policy Implementations in Enterprise Networks.
Padmalochan BeraSoumya Kanti GhoshPallab DasguptaPublished in: ICISS (2009)
Keyphrases
- formal verification
- security policies
- access control
- model checking
- network security
- security requirements
- security management
- distributed systems
- model checker
- symbolic model checking
- access control systems
- bounded model checking
- network management
- security architecture
- automated verification
- security concerns
- program slicing
- ubiquitous computing environments
- home network
- access control policies
- unauthorized access
- event logs
- access control mechanism
- information systems
- xml data
- supervised learning