Search
Now showing items 1-10 of 16
Audit Log Management in MongoDB
Publisher: IEEE
Year: 2014
Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints
Publisher: IEEE
Year: 2014
Analysing Requirements to Detect Latent Security Vulnerabilities
Publisher: IEEE
Year: 2014