DocumentCode :
378526
Title :
Security specification and verification
Author :
Fenkam, Pascal
Author_Institution :
Distributed Syst. Group, Tech. Univ. of Vienna, Austria
fYear :
2001
fDate :
26-29 Nov. 2001
Firstpage :
4340
Abstract :
Formalizing security requirements has received a significant attention since the 70s. However a general method for specifying security requirements is still missing. Especially, little work has been presented on specifying and verifying that a given application is a secure resource consumer The purpose of this work is to set up a methodology for (1) specifying security requirements of service providers and (2) proving that some application securely uses some resources. The developed theory will be evaluated and applied in two different areas: secure mobile code development and secure COTS-based software development.
Keywords :
formal specification; formal verification; security of data; secure COTS-based software development; secure mobile code development; security requirements; security specification; security verification; service providers; Application software; Computer security; Multilevel systems; Power engineering and energy; Power engineering computing; Power generation; Power system security; Programming; Software engineering; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Automated Software Engineering, 2001. (ASE 2001). Proceedings. 16th Annual International Conference on
ISSN :
1938-4300
Print_ISBN :
0-7695-1426-X
Type :
conf
DOI :
10.1109/ASE.2001.989847
Filename :
989847
Link To Document :
بازگشت