Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion

Ali Nasrat Haidar, Ali E. Abdallah

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
    Original languageEnglish
    Title of host publicationCommunications in Computer and Information Science
    EditorsTiziana Margaria, Bernhard Steffen
    Pages831-846
    Number of pages16
    Publication statusPublished (VoR) - 2009

    Publication series

    NameCommunications in Computer and Information Science
    Volume17
    ISSN (Print)1865-0929

    Keywords

    • Authentication
    • Authorization
    • Security Requirements
    • Weaving Security into Functional Models
    • Z Promotion
    • Z specification

    Fingerprint

    Dive into the research topics of 'Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion'. Together they form a unique fingerprint.

    Cite this