How Dataflow Diagrams Impact Software Security Analysis: an Empirical Experiment.
Simon SchneiderNicolás E. Díaz FerreyraPierre-Jean QuévalGeorg SimhandlUwe ZdunRiccardo ScandariatoPublished in: CoRR (2024)
Keyphrases
- security analysis
- smart card
- public key
- security requirements
- security model
- mutual authentication
- security properties
- authentication protocol
- encryption scheme
- software development
- software architecture
- image encryption
- high security
- software systems
- computer systems
- encryption algorithm
- user authentication
- authentication scheme
- open source
- data model
- high dimensional
- information systems
- data mining