Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution.
Sunil ChaudharyLinfeng LiEleni BerkiMarko HeleniusJuha KelaMarkku TurunenPublished in: FMICS (2015)
Keyphrases
- computational model
- finite state
- security requirements
- model checking
- process algebra
- access control
- mobile commerce
- markov chain
- mobile phone
- computational models
- markov decision processes
- temporal logic
- security analysis
- smart card
- formal specification
- concurrent systems
- mobile devices
- information security
- software architecture
- security mechanisms
- security policies
- optimal solution
- asynchronous circuits
- databases
- software engineering
- formal methods
- high security
- artificial intelligence