| Table of ContentsAbstracting Security Specifications in Building Survivable Systems Specification-Based Intrusion Detection Problem Domain Problem Definition Assumptions Rational The Setting An Example The Model The Algorithm (Q) Invariant Negation (I - Q) Mapping to the Code Audit Specification Language Run-Time Automation Benefits Conclusions | Author: Michel P. Eckersley |