On the verification of security-aware E-services
From MaRDI portal
Publication:429592
DOI10.1016/j.jsc.2011.12.033zbMath1241.94030OpenAlexW1972230883MaRDI QIDQ429592
Publication date: 20 June 2012
Published in: Journal of Symbolic Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jsc.2011.12.033
model completenessaccess control policiesBernays-Schönfinkel-Ramsey classconstraint logic programsrelational transducers
Logic in computer science (03B70) Authentication, digital signatures and secret sharing (94A62) Internet topics (68M11)
Related Items (3)
A Datalog hammer for supervisor verification conditions modulo simple linear arithmetic ⋮ On the verification of security-aware E-services ⋮ Parametrized automata simulation and application to service composition
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the verification of security-aware E-services
- Model-theoretic methods in combined constraint satisfiability
- Combining nonstably infinite theories
- Deciding effectively propositional logic using DPLL and substitution sets
- Model theory.
- Verification of relational transducers for electronic commerce
- Relational transducers for electronic commerce
- Deciding Effectively Propositional Logic Using DPLL and Substitution Sets
- Automated Reasoning
- On the Saturation of YAGO
This page was built for publication: On the verification of security-aware E-services