Verifying Security-Control Requirements and Validating their Effectiveness

被引:0
|
作者
Hunter, Bruce
机构
关键词
D O I
10.1002/inst.201316245
中图分类号
学科分类号
摘要
引用
收藏
页码:45 / 48
相关论文
共 50 条
  • [41] Verifying and validating a land use transport environment model
    Gu, K
    Young, W
    TRANSPORTATION PLANNING AND TECHNOLOGY, 1998, 21 (03) : 181 - 202
  • [42] Some approaches and paradigms for verifying and validating simulation models
    Sargent, RG
    WSC'01: PROCEEDINGS OF THE 2001 WINTER SIMULATION CONFERENCE, VOLS 1 AND 2, 2001, : 106 - 114
  • [43] Verifying and validating specification of knowledge-based systems
    Torres, L
    Frydman, C
    ECAI 1998: 13TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 1998, : 83 - 87
  • [44] A case study of verifying and validating an astrophysical simulation code
    Calder, A. C.
    Taylor, N. T.
    Antypas, K.
    Sheeler, D.
    Dubey, A.
    NUMERICAL MODELING OF SPACE PLASMA FLOWS: ASTRONUM-2006, 2006, 359 : 119 - +
  • [45] Verifying and Validating Autonomous Systems: Towards an Integrated Approach
    Ferrando, Angelo
    Dennis, Louise A.
    Ancona, Davide
    Fisher, Michael
    Mascardi, Viviana
    RUNTIME VERIFICATION (RV 2018), 2018, 11237 : 263 - 281
  • [46] GENERATING AND VALIDATING RAM REQUIREMENTS
    LAVERY, J
    WESTMORELAND, M
    PROCEEDINGS ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 1974, 7 (02): : 244 - 248
  • [47] Validating, verifying and testing timed data-flow reactive systems in Coq from controlled natural-language requirements
    Carvalho, Gustavo
    Meira, Igor
    SCIENCE OF COMPUTER PROGRAMMING, 2021, 201
  • [48] Validating requirements: the evolutionary approach
    Lemoine, N
    Marre, D
    Thuillier, P
    Wippler, JL
    TWENTY-SECOND ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE - PROCEEDINGS, 1998, : 458 - 463
  • [49] On the Communication Requirements of Verifying the VCG Outcome
    Lahaie, Sebastien
    Parkes, David C.
    EC'08: PROCEEDINGS OF THE 2008 ACM CONFERENCE ON ELECTRONIC COMMERCE, 2008, : 78 - 87
  • [50] Verifying the consistency of security policies by abstracting into security types
    Ono, Kouichi
    Nakamura, Yuichi
    Satoh, Fumiko
    Tateishi, Takaaki
    2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2007, : 497 - +