Amanote Research

Amanote Research

    RegisterSign In

Apply Model Checking to Security Analysis in Trust Management

doi 10.21236/ada462754
Full Text
Open PDF
Abstract

Available in full text

Date

February 1, 2007

Authors
Mark G. ReithJianwei NiuWilliam H. Winsborough
Publisher

Defense Technical Information Center


Related search

Model Checking Indistinguishability of Randomized Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

Social Security and Trust Fund Management

2004English

Apply Cross Spectral Analysis to Transfer Function Model Identification

2014English

Software Analysis and Model Checking

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2002English

Introduction to Reliability, Security and Trust Minitrack

2012English

Applying Model Checking to Destructive Testing and Analysis of Software System

Journal of Software
2013English

Mutual Trust to Provide Data Security in Cloud Environment

IOSR Journal of Computer Engineering
2014English

Verification of Security Policy Filtering Rules With Temporal Parameters by Model Checking

SPIIRAS Proceedings
ControlSystems EngineeringInformation SystemsComputer NetworksApplied MathematicsMathematicsCommunicationsComputer Science ApplicationsComputational TheoryComputational MathematicsArtificial Intelligence
2014English

Bringing LTL Model Checking to Biologists

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2017English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy