Contextualisation of Data Flow Diagrams for Security Analysis.
Shamal FailyRiccardo ScandariatoAdam ShostackLaurens SionDuncan Ki-AriesPublished in: GraMSec@CSF (2020)
Keyphrases
- data flow
- security analysis
- database machine
- public key
- control flow
- smart card
- high security
- security requirements
- encryption scheme
- mutual authentication
- object oriented software
- authentication protocol
- object oriented
- systolic array
- authentication scheme
- user authentication
- cost effective
- image compression
- web services
- information systems
- database