Automated Security Analysis for Microservice Architecture.
Nacha ChondamrongkulJing SunIan WarrenPublished in: ICSA Companion (2020)
Keyphrases
- security analysis
- smart card
- security requirements
- public key
- high security
- security properties
- real time
- software architecture
- user authentication
- security model
- mutual authentication
- image encryption
- proxy signature scheme
- private key
- encryption algorithm
- encryption scheme
- authentication protocol
- software engineering
- high dimensional
- similarity measure
- database systems
- databases