Login / Signup

Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code.

Alexander CobleighMartin HellLinus KarlssonOscar ReimerJonathan SönnerupDaniel Wisenhoff
Published in: EDOC Workshops (2018)
Keyphrases
  • third party
  • source code
  • sensitive information
  • information security
  • mashup
  • security issues
  • trusted third party
  • countermeasures
  • security mechanisms