@dblp

A Rigorous Approach to Uncovering Security Policy Violations in UML Designs.

, , , and . ICECCS, page 126-135. IEEE Computer Society, (2009)

Links and resources

Tags