Heuristics for safety and security constraints
DOI10.1016/J.ENTCS.2007.02.018zbMATH Open1277.68250OpenAlexW2050411875WikidataQ59416352 ScholiaQ59416352MaRDI QIDQ2864162FDOQ2864162
Authors: Flemming Nielson, Hanne Riis Nielson
Publication date: 6 December 2013
Published in: Electronic Notes in Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.entcs.2007.02.018
Recommendations
static analysissecurity propertiesleast fixed-point logicflow logicBell-Lapadula mandatory access control
Problem solving in the context of artificial intelligence (heuristics, search strategies, etc.) (68T20) Specification and verification (program logics, model checking, etc.) (68Q60) Semantics in the theory of computing (68Q55)
Cites Work
Uses Software
This page was built for publication: Heuristics for safety and security constraints
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2864162)