Information Security
From MaRDI portal
Publication:5492771
DOI10.1007/b100936zbMath1109.68456OpenAlexW4247926864MaRDI QIDQ5492771
Dimitar P. Guelev, Pierre-Yves Schobbens, Mark D. Ryan
Publication date: 16 October 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b100936
Data encryption (aspects in computer science) (68P25) Specification and verification (program logics, model checking, etc.) (68Q60)
Related Items
An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints, Policy analysis for administrative role-based access control, On the Decidability of the Safety Problem for Access Control Policies, Access Nets: Modeling Access to Physical Spaces