2015
DOI: 10.5121/ijcses.2015.6401
|View full text |Cite
|
Sign up to set email alerts
|

OS Verification- A Survey as a Source of Future Challenges

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…The situation awareness-based system may include some iteration because of important feedback element involved in situation awareness theory. Because of action, decision and feedback, specification and verification (Anjaria and Mishra, 2015) of implementation of situation awareness-based system can become very complex. This specification and verification of situation awareness-based systems can also be an important future research aspect.…”
Section: Conclusion and Future Scopementioning
confidence: 99%
“…The situation awareness-based system may include some iteration because of important feedback element involved in situation awareness theory. Because of action, decision and feedback, specification and verification (Anjaria and Mishra, 2015) of implementation of situation awareness-based system can become very complex. This specification and verification of situation awareness-based systems can also be an important future research aspect.…”
Section: Conclusion and Future Scopementioning
confidence: 99%
“…In information security also, automata have been widely used for specification, verification and validation of security mechanism. The specification, verification and validation of information security can be considered as controlling mechanism because based on these entities, information security policies are designed as suggested by Ma et al (2010) and Anjaria and Mishra (2015). The automata have capabilities to track the probabilistic movements in the system also.…”
Section: Communication Between Two Machines With Information Security Mechanismmentioning
confidence: 99%