饮料 发表于 2025-4-1 05:16:52

http://reply.papertrans.cn/32/3110/310937/310937_61.png

喧闹 发表于 2025-4-1 07:50:42

https://doi.org/10.1057/9780230377462 systems development, one might refine such a design by viewing a component as being composed of subcomponents, and specifying permitted flows of information between these subcomponents and others in the design. The paper studies the soundness of such refinements with respect to a spectrum of differ

使残废 发表于 2025-4-1 13:08:50

http://reply.papertrans.cn/32/3110/310937/310937_63.png

myriad 发表于 2025-4-1 14:56:43

The cold shredder: a special method,o mitigate security risk; measuring and reducing the . of software is a complementary approach. In this paper, we apply a method for measuring attack surfaces to enterprise software written in .. We implement a tool as an Eclipse plugin to measure an SAP software system’s attack surface in an automa
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Engineering Secure Software and Systems; First International Fabio Massacci,Samuel T. Redwine,Nicola Zannone Conference proceedings 2009 S