Sign in

Detecting violations of access control and information flow policies in data flow diagrams.

Stephan SeifermannRobert HeinrichDominik WerleRalf H. Reussner
Published in: J. Syst. Softw. (2022)
Keyphrases