메뉴 건너뛰기




Volumn , Issue , 2007, Pages 734-743

Apply model checking to security analysis in trust management

Author keywords

[No Author keywords available]

Indexed keywords

COLLOIDS; GELATION; HELIUM; POLYNOMIAL APPROXIMATION; TECHNOLOGY;

EID: 48349123650     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDEW.2007.4401061     Document Type: Conference Paper
Times cited : (8)

References (16)
  • 6
    • 35048849152 scopus 로고    scopus 로고
    • Model checking access control policies
    • Proceedings of the 7th Information Security Conference, of, Springer-Verlag
    • D. P. Guelev, M. Ryan, and P. Y. Schobbens. Model checking access control policies. In Proceedings of the 7th Information Security Conference, volume 3225 of Lecture Notes in Computer Science. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3225
    • Guelev, D.P.1    Ryan, M.2    Schobbens, P.Y.3
  • 7
    • 0002426352 scopus 로고    scopus 로고
    • Lightweight formal methods, contribution to an invitation to formal methods
    • D. Jackson and J. Wing. Lightweight formal methods, contribution to an invitation to formal methods. IEEE Computer, 29:16-30, 1996.
    • (1996) IEEE Computer , vol.29 , pp. 16-30
    • Jackson, D.1    Wing, J.2
  • 9
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM (JACM), 52(3):474-514, 2005.
    • (2005) Journal of the ACM (JACM) , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 16
    • 33645964601 scopus 로고    scopus 로고
    • Evaluating access control policies through model checking
    • Proceedings of the 8th Information Security Conference, of, Springer-Verlag
    • N. Zhang, M. Ryan, and D. P. Guelev. Evaluating access control policies through model checking. In Proceedings of the 8th Information Security Conference, volume 3650 of Lecture Notes in Computer Science, pages 446-460. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3650 , pp. 446-460
    • Zhang, N.1    Ryan, M.2    Guelev, D.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.