Login / Signup
To Strengthen Security, Change Developers' Incentives.
J. Alex Halderman
Published in:
IEEE Secur. Priv. (2010)
Keyphrases
</>
information security
access control
open source
security requirements
security policies
software development
source code
security issues
information assurance
security level
statistical databases
data security
intrusion detection
network security
software projects
end users
human operators
cyber security