News
To fill this gap, we introduce data flows in an architectural description language to enable simple definition of confidentiality constraints. Afterwards, we transform the software architecture ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results