Login / Signup
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code.
Alexander Cobleigh
Martin Hell
Linus Karlsson
Oscar Reimer
Jonathan Sönnerup
Daniel Wisenhoff
Published in:
EDOC Workshops (2018)
Keyphrases
</>
third party
source code
sensitive information
information security
mashup
security issues
trusted third party
countermeasures
security mechanisms