Rule-based dependency models for security protocol analysis
Integrated Computer-Aided Engineering
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
An enhanced secure preserving for pre-processed data using DMI and PCRBAC algorithm
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Hi-index | 0.00 |
The outcome of a test of an application that stores data in a database naturally depends on the state of the database. It is therefore important that test developers are able to set up and tear down database states in a simple and efficient manner. In ...