Verification of UML-based security policy model

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Since the security policy model plays an important role in any secure information system, its specification has been studied extensively. In particular, UML-based specification has widely used because of its visual characteristics. Although visual specifications are good to write, they are difficult to verify whether some desired properties are hold in a given specification. This paper shows our techniques to verify UML-based specification with a running example. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Park, S., & Kwon, G. (2005). Verification of UML-based security policy model. In Lecture Notes in Computer Science (Vol. 3482, pp. 973–982). Springer Verlag. https://doi.org/10.1007/11424857_105

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free