Sign in

Modeling and validation for embedded software confidentiality and integrity.

Xinwen HuYi ZhuangZining CaoTong YeMi Li
Published in: ISKE (2017)
Keyphrases
  • embedded software
  • sequence diagrams
  • software architecture
  • development projects
  • embedded systems
  • access control
  • databases
  • integrity constraints