Login / Signup
Dynamic security rules for legacy systems.
Rima Al Ali
Petr Hnetynka
Jiri Havlik
Vlastimil Krivka
Robert Heinrich
Stephan Seifermann
Maximilian Walter
Adrian Juan Verdejo
Published in:
ECSA (Companion) (2019)
Keyphrases
</>
legacy systems
business rules
reverse engineering
database
information systems
intrusion detection
network security
databases
security issues
business processes
association rules
fine grained
life cycle
development process
access control
production rules
source code
statistical databases
web services