×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
achim-d-brucker documents
Technology
Security in the Context of Business Processes: Thoughts from a System Vendor's Perspective
Technology
SAST for JavaScript: A Brief Overview of Commercial Tools
Technology
Featherweight OCL: A study for the consistent semantics of OCL 2.3 in HOL
Technology
A Collection of Real World (JavaScript) Security Problems: Examples from 2 1/2 Applications Areas of JavaScript
Technology
Model-based Conformance Testing of Security Properties
Technology
Service Compositions: Curse or Blessing for Security?
Software
Industrial Challenges of Secure Software Development
Technology
Extending Access Control Models with Break-glass
Technology
BPM and Cloud Integration: A New Driver for Research in Security in Business Processes
Technology
A Framework for Secure Service Composition
Technology
Encoding Object-oriented Datatypes in HOL: Extensible Records Revisited
Technology
Integrating Application Security into a Software Development Process
Software
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integrating Security Testing "End-to-End" Into the Software Life-Cycle at SAP
Software
Bringing Security Testing to Development: How to Enable Developers to Act as Security Experts
Technology
Deploying Static Application Security Testing on a Large Scale
Documents
Verifying Test-Hypotheses: An Experiment in Test and Proof
Documents
A Case Study of a Formalized Security Architecture
Technology
On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache Cordova Nation
Technology
Using Third Party Components for Building an Application Might be More Dangerous Than You Think!
Technology
Isabelle: Not Only a Proof Assistant