Information system security function validating using model checking


Information systems will be encountered more and more security threats due to the development of computer attack method and technology. Generally, different security policies are used to protect the sensitive information in these systems. There has been a lot of study on security policy conformance and completeness verification and validation. However… (More)


3 Figures and Tables

Cite this paper

@article{Ma2010InformationSS, title={Information system security function validating using model checking}, author={Jianli Ma and Guoai Xu and Yixian Yang and Yong Ji}, journal={2010 2nd International Conference on Computer Engineering and Technology}, year={2010}, volume={1}, pages={V1-517-V1-521} }