메뉴 건너뛰기




Volumn 5826 LNCS, Issue , 2009, Pages 113-128

Automatic testing of access control for security properties

Author keywords

[No Author keywords available]

Indexed keywords

BLACK BOXES; CONTROLLER SYNTHESIS; LABELED TRANSITION SYSTEMS; PARTIALLY OBSERVABLE SYSTEMS; SECURITY POLICY; SECURITY PROPERTIES; TEST GENERATIONS;

EID: 70549090132     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-05031-2_8     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 1
    • 33746373966 scopus 로고    scopus 로고
    • Preserving secrecy under refinement
    • Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
    • Alur, R., Černý, P., Zdancewic, S.: Preserving secrecy under refinement. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 107-118. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 107-118
    • Alur, R.1    Černý, P.2    Zdancewic, S.3
  • 4
    • 26844508455 scopus 로고    scopus 로고
    • Automated Verification of Selected Equivalences for Security Protocols
    • Chicago, IL, June, 2005
    • Blanchet, B., Abadi, M., Fournet, C.: Automated Verification of Selected Equivalences for Security Protocols. In: 20th IEEE Symposium on Logic in Computer Science (LICS 2005), Chicago, IL, June 2005, pp. 331-340 (2005)
    • (2005) 20th IEEE Symposium on Logic in Computer Science (LICS , pp. 331-340
    • Blanchet, B.1    Abadi, M.2    Fournet, C.3
  • 8
    • 33745877300 scopus 로고    scopus 로고
    • Darmaillacq, V., Fernandez, J.-C., Groz, R., Mounier, L., Richier, J.-L.: Test generation for network security rules. In: Uyar, M.Ü., Duale, A.Y., Fecko, M.A. (eds.) TestCom 2006. LNCS, 3964, pp. 341-356. Springer, Heidelberg (2006)
    • Darmaillacq, V., Fernandez, J.-C., Groz, R., Mounier, L., Richier, J.-L.: Test generation for network security rules. In: Uyar, M.Ü., Duale, A.Y., Fecko, M.A. (eds.) TestCom 2006. LNCS, vol. 3964, pp. 341-356. Springer, Heidelberg (2006)
  • 10
    • 70549100256 scopus 로고    scopus 로고
    • Supervisory control for opacity
    • Technical Report 1921, IRISA February
    • Dubreil, J., Darondeau, Ph., Marchand, H.: Supervisory control for opacity. Technical Report 1921, IRISA (February 2009)
    • (2009)
    • Dubreil, J.1    Darondeau, P.2    Marchand, H.3
  • 13
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • Lowe, G.: Towards a completeness result for model checking of security protocols. Journal of Computer Security 7(2-3), 89-146 (1999)
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 89-146
    • Lowe, G.1
  • 14
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30-50 (2000)
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 15
    • 84888268734 scopus 로고    scopus 로고
    • Testing concurrent systems: A formal approach
    • Baeten, J.C.M, Mauw, S, eds, CONCUR 1999, Springer, Heidelberg
    • Tretmans, J.: Testing concurrent systems: A formal approach. In: Baeten, J.C.M., Mauw, S. (eds.) CONCUR 1999. LNCS, vol. 1664, pp. 46-65. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1664 , pp. 46-65
    • Tretmans, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.