Author:
Sen Amartya,Madria Sanjay
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference47 articles.
1. Checking threat modeling data flow diagrams for implementation conformance and security;Abi-Antoun,2007
2. Automated software architecture security risk analysis using formalized signatures;Almorsy,2013
3. An efficient and practical smart card based anonymity preserving user authentication scheme for tmis using elliptic curve cryptography;Amin;J Med Syst,2015
4. Brunette G., Mogull R.. Security guidance for critical areas of focus in cloud computing v2.1. 2009.
5. A risk assessment model for selecting cloud service providers;Cayirci;Journal of Cloud Computing,2016
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献