Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines Conference Paper uri icon

publication date

  • October 1, 2008

published in

  •  

start page

  • 173

end page

  • 180