Secure development tool adoption in open-source.
Jim WitscheyPublished in: SPLASH (Companion Volume) (2013)
Keyphrases
- open source
- source code
- open source software
- information technology
- proprietary software
- information systems
- case study
- neural network
- covert channel
- security analysis
- standard model
- open source projects
- authentication scheme
- data sets
- security requirements
- key management
- smart card
- security protocols
- user authentication
- security level
- lightweight
- electronic data interchange