Login / Signup
Checking threat modeling data flow diagrams for implementation conformance and security.
Marwan Abi-Antoun
Daniel Wang
Peter Torr
Published in:
ASE (2007)
Keyphrases
</>
data flow
database machine
control flow
data transfer
digital signal processing
object oriented software
information security
systolic array
artificial intelligence
databases
intrusion detection
modeling language
security issues
object oriented
access control
protocol specification