How Dataflow Diagrams Impact Software Security Analysis: an Empirical Experiment.
Simon SchneiderNicolás E. Díaz FerreyraPierre-Jean QuévalGeorg SimhandlUwe ZdunRiccardo ScandariatoPublished in: SANER (2024)
Keyphrases
- security analysis
- public key
- smart card
- security requirements
- high security
- security model
- security properties
- software development
- software systems
- image encryption
- source code
- user authentication
- software architecture
- authentication protocol
- proxy signature scheme
- software engineering
- encryption algorithm
- fine grained
- multiresolution
- data mining
- mutual authentication
- databases