News
Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings - IEEE Xplore
During the development of security-critical software, the system implementation must capture the security properties postulated by the architectural design. This paper presents an approach to support ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results