Login / Signup

A Catalog of Security Architecture Weaknesses.

Joanna C. S. SantosKaty TarritMehdi Mirakhorli
Published in: ICSA Workshops (2017)
Keyphrases
  • security architecture
  • access control
  • security model
  • security policies
  • intrusion detection system
  • data integrity
  • simulation platform
  • security mechanisms
  • insider threat
  • data protection
  • computer systems