News
Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings - IEEE Xplore
These mappings are created by searching for correspondences between a design-level model (Security Data Flow Diagram) and an implementation-level model (Program Model). We limit the search space by ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results