Login / Signup

Why Secure Applications are Difficult to Write.

James A. Whittaker
Published in: IEEE Secur. Priv. (2003)
Keyphrases
  • security requirements
  • expert systems
  • security issues
  • security analysis
  • machine learning
  • information retrieval
  • access control
  • lightweight
  • error prone
  • security model
  • authentication scheme
  • scalar product