Login / Signup
Extracting and Analyzing the Implemented Security Architecture of Business Applications.
Bernhard J. Berger
Karsten Sohr
Rainer Koschke
Published in:
CSMR (2013)
Keyphrases
</>
business applications
security architecture
business processes
data mining
web services
access control
database applications
web applications
business process
security policies
database
information systems
simulation platform