A model checking-based approach for security policy verification of mobile systems
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1670555 (Why is no real title available?)
- scientific article; zbMATH DE number 1670562 (Why is no real title available?)
- scientific article; zbMATH DE number 1231689 (Why is no real title available?)
- scientific article; zbMATH DE number 734956 (Why is no real title available?)
- scientific article; zbMATH DE number 1982207 (Why is no real title available?)
- scientific article; zbMATH DE number 1796143 (Why is no real title available?)
- scientific article; zbMATH DE number 1798184 (Why is no real title available?)
- scientific article; zbMATH DE number 2087553 (Why is no real title available?)
- scientific article; zbMATH DE number 1834570 (Why is no real title available?)
- scientific article; zbMATH DE number 794257 (Why is no real title available?)
- A calculus of kells
- A model checking-based approach for security policy verification of mobile systems
- CONCUR 2004 - Concurrency Theory
- Computer Aided Verification
- Integrated Formal Methods
- Mobile ambients
- Model Checking Software
- Model checking JAVA programs using JAVA PathFinder
- Programming Languages and Systems
- Static Analysis
- TLPVS
- The Kell calculus: operational semantics and type system.
- Tools and Algorithms for the Construction and Analysis of Systems
- Tools and Algorithms for the Construction and Analysis of Systems
- Verification of Boolean programs with unbounded thread creation
- Verifying safety properties of concurrent Java programs using 3-valued logic
Cited in
(8)- A UTP approach for rTiMo
- UTP semantics for rTiMo
- A model checking-based approach for security policy verification of mobile systems
- scientific article; zbMATH DE number 1612498 (Why is no real title available?)
- Evaluating Security Policies in Pervasive Mobile Environments Using Context Information
- Process expression of security automaton
- Verification of security-relevant behavior model and security policy for model-carrying code
- LoPSiL: A location-based policy-specification language
Describes a project that uses
Uses Software
This page was built for publication: A model checking-based approach for security policy verification of mobile systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q432137)