Login / Signup
Secure Self-Certified COTS.
Mourad Debbabi
E. Giasson
Béchir Ktari
Frédéric Michaud
Nadia Tawbi
Published in:
WETICE (2000)
Keyphrases
</>
third party
software components
security requirements
limited resources
identity management
security issues
security analysis
data sets
decision support
security mechanisms
cryptographic protocols
databases
web services
sensitive data
key management
integrity verification