Skip to main navigation
Skip to search
Skip to main content
Penn State Home
Help & FAQ
Home
Researchers
Research output
Research units
Equipment
Grants & Projects
Prizes
Activities
Search by expertise, name or affiliation
Modeling and checking the security of DIFC system configurations
Mingyi Zhao,
Peng Liu
Institute for Computational and Data Sciences (ICDS)
College of Information Sciences and Technology
Research output
:
Chapter in Book/Report/Conference proceeding
›
Chapter
1
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Modeling and checking the security of DIFC system configurations'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Flow Control System
100%
Decentralized Information Flow Control
100%
Misconfiguration
75%
Data Integrity
25%
Security Threats
25%
Control Configuration
25%
Attacker
25%
Information Flow
25%
Problem Analysis
25%
Security Analysis
25%
Security Goals
25%
Model Checker
25%
System Objects
25%
Data Secrecy
25%
Model Checking Techniques
25%
Computer Science
Information Flow Control
100%
System Configuration
100%
Misconfiguration
75%
Attackers
25%
State Transition
25%
Model Checking
25%
Security Analysis
25%
Systematic Analysis
25%
model checker
25%
Transition Model
25%
Checking Technique
25%