Since the security policy model plays an important role in any secure information system, its specification has been studied extensively. In particular, UML-based specification has widely used because of its visual characteristics. Although visual specifications are good to write, they are difficult to verify whether some desired properties are hold in a given specification. This paper shows our techniques to verify UML-based specification with a running example. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Park, S., & Kwon, G. (2005). Verification of UML-based security policy model. In Lecture Notes in Computer Science (Vol. 3482, pp. 973–982). Springer Verlag. https://doi.org/10.1007/11424857_105
Mendeley helps you to discover research relevant for your work.