Cargando…

Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model

The modeling of security threats is equally important as the modeling of functional requirements at the design stage of software engineering. However, unlike functional requirements modeling, the modeling of security threats is neglected, which consequently introduces software defects during the ear...

Descripción completa

Detalles Bibliográficos
Autores principales: Ullah, Ubaid, Faiz, Rizwan Bin, Haleem, Muhammad
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9258847/
https://www.ncbi.nlm.nih.gov/pubmed/35793370
http://dx.doi.org/10.1371/journal.pone.0270702