Verifying Security-Control Requirements and Validating their Effectiveness

被引:0
|
作者
Hunter, Bruce
机构
关键词
D O I
10.1002/inst.201316245
中图分类号
学科分类号
摘要
引用
收藏
页码:45 / 48
相关论文
共 50 条
  • [21] Describing, verifying and validating a system definition
    Moore, Alan
    Electronic Engineering (London), 1999, 71 (872):
  • [22] Verifying the Security Characteristics of a Secure Physical Access Control Protocol
    Carryl, Clyde
    Alhalabi, Bassem
    Khoshgoftaar, Taghi M.
    Bullard, Lofton
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2016, 23 (02)
  • [23] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
  • [24] Validating Feedback Control to Meet Stiffness Requirements in Additive Manufacturing
    Garanger, Kevin
    Khamvilai, Thanakorn
    Feron, Eric
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2020, 28 (05) : 2053 - 2060
  • [25] Validating and verifying fixture kinematics for virtual manufacturing
    Christiand
    Wang, Gi-Nam
    Kim, Eui-Whan
    INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2014, 27 (12) : 1136 - 1143
  • [26] Cost Model for Verifying Requirements
    Dou, Edward
    2016 IEEE AUTOTESTCON PROCEEDINGS, 2016,
  • [27] Security and access control requirements for computerized systems
    McDowall, R. D.
    LC GC EUROPE, 2007, 20 (11) : 583 - 585
  • [28] Verifying persistent security properties
    Bossi, A
    Focardi, R
    Piazza, C
    Rossi, S
    COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2004, 30 (3-4) : 231 - 258
  • [29] Compiling and verifying security protocols
    Jacquemard, F
    Rusinowitch, M
    Vigneron, L
    LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
  • [30] Verifying Security Invariants in ExpressOS
    Mai, Haohui
    Pek, Edgar
    Xue, Hui
    King, Samuel T.
    Madhusudan, P.
    ACM SIGPLAN NOTICES, 2013, 48 (04) : 293 - 303