Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

Enforceable Security Policies Revisited.

Subjects: COMPUTER security; GENERALIZATION; CLASSIFICATION

  • Source: ACM Transactions on Information & System Security (TISSEC); Jun2013, Vol. 16 Issue 1, p1-26, 26p, 2 Diagrams

Record details

×
Conference

Deciding weak monitorability for runtime verification.

Subjects: SOFTWARE verification; DECISION making; CUSTOMER satisfaction

  • Source: ICSE: International Conference on Software Engineering; 5/27/2018, p163-164, 2p

Record details

×
  • 1-5 of  5 results for ""SATISFACTION""