Weaving authentication and authorization requirements into the functional model of a system using Z promotion

Ali Nasrat Haidar, Ali E. Abdallah

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Original languageEnglish
    Title of host publicationLeveraging Applications of Formal Methods, Verification and Validation - Third International Symposium, ISoLA 2008, Proceedings
    PublisherSpringer Verlag
    Pages831-846
    Number of pages16
    ISBN (Print)3540884785, 9783540884781
    DOIs
    Publication statusPublished (VoR) - 2008

    Publication series

    NameCommunications in Computer and Information Science
    Volume17 CCIS
    ISSN (Print)1865-0929

    Keywords

    • Authentication
    • Authorization
    • Security Requirements
    • Weaving Security into Functional Models
    • Z Promotion
    • Z specification

    Fingerprint

    Dive into the research topics of 'Weaving authentication and authorization requirements into the functional model of a system using Z promotion'. Together they form a unique fingerprint.

    Cite this