Suspicion-driven formal analysis of security requirements

Nuno Amálio*

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
    Original languageEnglish
    Title of host publicationProceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009
    Pages217-223
    Number of pages7
    DOIs
    Publication statusPublished (VoR) - 2009
    Event2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 - Athens, Glyfada, Greece
    Duration: 18 Jun 200923 Jun 2009

    Publication series

    NameProceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009

    Conference

    Conference2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009
    Country/TerritoryGreece
    CityAthens, Glyfada
    Period18/06/0923/06/09

    Keywords

    • Confidentiality
    • Event-Calculus
    • Formal analysis
    • Planning
    • Requirements
    • Security
    • Separation of duty

    Fingerprint

    Dive into the research topics of 'Suspicion-driven formal analysis of security requirements'. Together they form a unique fingerprint.

    Cite this