1. In information assurance, comparing an activity, a process, or a product with the corresponding requirements or specifications. Note: Examples of verification are comparing a specification with a security policy model or comparing object code with source code. 2. The process of comparing two levels of an information system (IS) specification for proper correspondence (e.g., security policy model with top-level specification, top-level specification with source code, or source code with object code. ) 3. The checking of conformance between two representations of a system or part of a system. 4. The process of comparing two levels of system specification for proper correspondence (e.g., security policy model with top-level specification, TLS with source code, or source code with object code. )This process may or may not be automated.
创建者
- KeithC3
- 100% positive feedback