Login / Signup
Modeling and validation for embedded software confidentiality and integrity.
Xinwen Hu
Yi Zhuang
Zining Cao
Tong Ye
Mi Li
Published in:
ISKE (2017)
Keyphrases
</>
embedded software
sequence diagrams
software architecture
development projects
embedded systems
access control
databases
integrity constraints