Login / Signup

Automated verification of security pattern compositions.

Jing DongTu PengYajing Zhao
Published in: Inf. Softw. Technol. (2010)
Keyphrases