Table of Contents
Abstracting Security Specifications in Building Survivable Systems
Specification-Based Intrusion Detection
Problem Domain
Problem Definition
Assumptions
Rational
The Setting
An Example
The Model
The Algorithm (Q)
Invariant Negation (I - Q)
Mapping to the Code
Audit Specification Language
Run-Time
Automation Benefits
Conclusions
|
Author: Michel P. Eckersley
|