Login / Signup
An Evaluation of Java Application Containers according to Security Requirements.
Almut Herzog
Nahid Shahmehri
Published in:
WETICE (2005)
Keyphrases
</>
security requirements
security analysis
access control
smart card
reference models
real world
open source
data management
information security
security policies
security model
security properties
security problems
security concerns
development lifecycle