News
This paper presents an approach to support secure data-flow ... (Security Data Flow Diagram) and an implementation-level model (Program Model). We limit the search space by considering name ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results