2013
DOI: 10.1007/978-3-642-36563-8_6
|View full text |Cite
|
Sign up to set email alerts
|

Compositional Verification of Application-Level Security Properties

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…Partial/compositional/modular model checking [1,14] has been applied extensively in the literature for security analysis [2,16,[28][29][30]. This technique relies on decomposing a system S into a set of individually analyzable subsystems S 1 S 2 .. S n for a property to be analyzed P = P 1 P 2 .. P m [5,6].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Partial/compositional/modular model checking [1,14] has been applied extensively in the literature for security analysis [2,16,[28][29][30]. This technique relies on decomposing a system S into a set of individually analyzable subsystems S 1 S 2 .. S n for a property to be analyzed P = P 1 P 2 .. P m [5,6].…”
Section: Related Workmentioning
confidence: 99%
“…Gunawan et al use compositional strategy for verification of security properties [16]. This is done by describing the system features individually in a modular design where each module is constrained by local security properties.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, SPACE has been already used for encapsulating security functionality in a form of building blocks with validation of their correct integration . Finally, the recent work of Gunawan and Herrmann enables compositional verification of security properties for SPACE models.…”
Section: Case Study and Backgroundmentioning
confidence: 99%
“…The composed system model is automatically transformed into executable Java code [17]. Further, various formal verification methods ensure functional correctness [17] as well as reliability [27], security [9] and safety [12,13] of targeted systems.…”
Section: Introductionmentioning
confidence: 99%