Token-based scanning of source code for security problems.
John ViegaJ. T. BlochTadayoshi KohnoGary McGrawPublished in: ACM Trans. Inf. Syst. Secur. (2002)
Keyphrases
- source code
- security problems
- computer networks
- open source
- security requirements
- security issues
- security mechanisms
- software systems
- data security
- software maintenance
- software projects
- software evolution
- cyber attacks
- smart card
- access control
- high level
- artificial intelligence
- software engineering
- real world
- database design