Login / Signup

A methodology to build run-time monitors for security-aware workflows.

Clara BertolissiSilvio Ranise
Published in: ICITST (2013)
Keyphrases