A model-based approach to integrating security policies for embedded devices
- 27 September 2004
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 211-219
- https://doi.org/10.1145/1017753.1017789
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- EFFICIENT DEFEASIBLE REASONING SYSTEMSInternational Journal on Artificial Intelligence Tools, 2001
- Propositional defeasible logic has linear complexityTheory and Practice of Logic Programming, 2001
- A hybrid model for specifying features and detecting interactionsComputer Networks, 2000
- Enforceable security policiesACM Transactions on Information and System Security, 2000
- A declarative approach to business rules in contractsPublished by Association for Computing Machinery (ACM) ,1999
- Conflicts in policy-based distributed systems managementIEEE Transactions on Software Engineering, 1999
- Formal methodsACM Computing Surveys, 1996
- Computer-aided verificationIEEE Spectrum, 1996
- Miro: visual specification of securityIEEE Transactions on Software Engineering, 1990
- Statecharts: a visual formalism for complex systemsScience of Computer Programming, 1987