×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of achim-d-brucker
Security in the Context of Business Processes: Thoughts from a System Vendor's Perspective
517 views
SAST for JavaScript: A Brief Overview of Commercial Tools
157 views
Featherweight OCL: A study for the consistent semantics of OCL 2.3 in HOL
229 views
A Collection of Real World (JavaScript) Security Problems: Examples from 2 1/2 Applications Areas of JavaScript
37 views
Model-based Conformance Testing of Security Properties
94 views
Service Compositions: Curse or Blessing for Security?
1.882 views
Industrial Challenges of Secure Software Development
166 views
Extending Access Control Models with Break-glass
386 views
BPM and Cloud Integration: A New Driver for Research in Security in Business Processes
39 views
A Framework for Secure Service Composition
136 views
Encoding Object-oriented Datatypes in HOL: Extensible Records Revisited
218 views
Integrating Application Security into a Software Development Process
278 views
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integrating Security Testing "End-to-End" Into the Software Life-Cycle at SAP
216 views
Bringing Security Testing to Development: How to Enable Developers to Act as Security Experts
91 views
Deploying Static Application Security Testing on a Large Scale
277 views
Verifying Test-Hypotheses: An Experiment in Test and Proof
215 views
A Case Study of a Formalized Security Architecture
214 views
On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache Cordova Nation
271 views
Using Third Party Components for Building an Application Might be More Dangerous Than You Think!
112 views
Isabelle: Not Only a Proof Assistant
232 views