Login / Signup
Threat Modelling for ASP.NET - Designing Secure Applications.
Rüidiger Grimm
Henrik Eichstädt
Published in:
Communications and Multimedia Security (2004)
Keyphrases
</>
answer set programming
web applications
advanced metering infrastructure
security requirements
databases
lightweight
countermeasures
security issues
authentication scheme
real time
data mining
user authentication
covert channel