A Model-Based Method for Security Configuration Verification

Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa. A Model-Based Method for Security Configuration Verification. In Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura, editors, Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings. Volume 4266 of Lecture Notes in Computer Science, pages 60-75, Springer, 2006. [doi]

Authors

Hiroshi Sakaki

This author has not been identified. Look up 'Hiroshi Sakaki' in Google

Kazuo Yanoo

This author has not been identified. Look up 'Kazuo Yanoo' in Google

Ryuichi Ogawa

This author has not been identified. Look up 'Ryuichi Ogawa' in Google