Olga Chervatuk

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
To build a powerful and flexible security policy verification tool, it is very important to use the approach which allows covering all possible inconsistencies, has open (extendable) architecture and efficient verification implementation. We suggest using a family of different verification modules each of which can work with acceptable computational(More)
  • 1