Login / Signup
Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript of Discussion).
Phillip J. Brooke
Published in:
Security Protocols Workshop (2012)
Keyphrases
</>
programming language
real time
information systems
access control
application scenarios
database
neural network
data mining
social networks
case study
network security
strengths and weaknesses
functional requirements
elliptic curve