Symbolic backward reachability with effectively propositional logic. Application to security policy analysis (Q2441771): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q2730725 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4052071 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Access Nets: Modeling Access to Physical Spaces / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4417916 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis / rank
 
Normal rank
Property / cites work
 
Property / cites work: MCMT: A Model Checker Modulo Theories / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4003410 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Complexity results for classes of quantificational formulas / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encodings of Bounded LTL Model Checking in Effectively Propositional Logic / rank
 
Normal rank
Property / cites work
 
Property / cites work: The TPTP problem library and associated infrastructure and associated infrastructure. The FOF and CNF parts, v3.5.0 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Policy analysis for administrative role-based access control / rank
 
Normal rank
Property / cites work
 
Property / cites work: Combining nonstably infinite theories / rank
 
Normal rank

Latest revision as of 12:20, 7 July 2024

scientific article
Language Label Description Also known as
English
Symbolic backward reachability with effectively propositional logic. Application to security policy analysis
scientific article

    Statements

    Symbolic backward reachability with effectively propositional logic. Application to security policy analysis (English)
    0 references
    0 references
    28 March 2014
    0 references
    symbolic model checking
    0 references
    SMT solving
    0 references
    security analysis of administrative role-based access control policies
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references