Login / Signup

Extracting and Analyzing the Implemented Security Architecture of Business Applications.

Bernhard J. BergerKarsten SohrRainer Koschke
Published in: CSMR (2013)
Keyphrases