ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Scenario Driven Approach for Security Policy Testing Based on Model Checking
2009 International Conference on Information Engineering and Computer Science
◽
10.1109/iciecs.2009.5365628
◽
2009
◽
Cited By ~ 1
Author(s):
Yan Chen
◽
Dan Wu
Keyword(s):
Model Checking
◽
Security Policy
◽
Policy Testing
Download Full-text
Related Documents
Cited By
References
Transforming and Selecting Functional Test Cases for Security Policy Testing
2009 International Conference on Software Testing Verification and Validation
◽
10.1109/icst.2009.49
◽
2009
◽
Cited By ~ 13
Author(s):
Tejeddine Mouelhi
◽
Yves Le Traon
◽
Benoit Baudry
Keyword(s):
Security Policy
◽
Functional Test
◽
Test Cases
◽
Policy Testing
Download Full-text
Security policy testing via automated program code generation
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies - CSIIRW '09
◽
10.1145/1558607.1558623
◽
2009
◽
Cited By ~ 4
Author(s):
Ting Yu
◽
Dhivya Sivasubramanian
◽
Tao Xie
Keyword(s):
Code Generation
◽
Security Policy
◽
Program Code
◽
Policy Testing
Download Full-text
Security policy testing using vulnerability exploit chaining
2008 IEEE International Conference on Software Testing Verification and Validation Workshop
◽
10.1109/icstw.2008.37
◽
2008
◽
Author(s):
Vianney Darmaillacq
Keyword(s):
Security Policy
◽
Policy Testing
Download Full-text
Model Checking Based Security Policy Verification and Validation
2010 2nd International Workshop on Intelligent Systems and Applications
◽
10.1109/iwisa.2010.5473291
◽
2010
◽
Cited By ~ 7
Author(s):
Jianli Ma
◽
Dongfang Zhang
◽
Guoai Xu
◽
Yixian Yang
Keyword(s):
Model Checking
◽
Security Policy
◽
Verification And Validation
Download Full-text
Verification of security policy filtering rules by Model Checking
Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems
◽
10.1109/idaacs.2011.6072862
◽
2011
◽
Cited By ~ 10
Author(s):
Igor Kotenko
◽
Olga Polubelova
Keyword(s):
Model Checking
◽
Security Policy
Download Full-text
Session details: Session 3: Security Policy Testing and Enforcement
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies
◽
10.1145/3470751
◽
2021
◽
Author(s):
Dianxiang Xu
Keyword(s):
Security Policy
◽
Policy Testing
Download Full-text
Model checking security policy model using both UML static and dynamic diagrams
Proceedings of the 4th international conference on Security of information and networks - SIN '11
◽
10.1145/2070425.2070451
◽
2011
◽
Cited By ~ 2
Author(s):
Liang Cheng
◽
Yang Zhang
Keyword(s):
Model Checking
◽
Security Policy
◽
Policy Model
Download Full-text
Parameterized model checking for security policy analysis
International Journal on Software Tools for Technology Transfer
◽
10.1007/s10009-015-0410-1
◽
2015
◽
Vol 18
(5)
◽
pp. 559-573
◽
Cited By ~ 4
Author(s):
Silvio Ranise
◽
Anh Truong
◽
Riccardo Traverso
Keyword(s):
Model Checking
◽
Policy Analysis
◽
Security Policy
◽
Parameterized Model
Download Full-text
Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus
Lecture Notes in Computer Science - Computer Network Security
◽
10.1007/978-3-642-14706-7_12
◽
2010
◽
pp. 155-168
◽
Cited By ~ 1
Author(s):
Devrim Unal
◽
Ozan Akar
◽
M. Ufuk Caglayan
Keyword(s):
Model Checking
◽
Security Policy
◽
Ambient Calculus
Download Full-text
A model checking-based approach for security policy verification of mobile systems
Formal Aspects of Computing
◽
10.1007/s00165-010-0159-y
◽
2010
◽
Vol 23
(5)
◽
pp. 627-648
◽
Cited By ~ 11
Author(s):
Chiara Braghin
◽
Natasha Sharygina
◽
Katerina Barone-Adesi
Keyword(s):
Model Checking
◽
Security Policy
◽
Mobile Systems
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close