Analysis of information flow security using software implementing business logic based on stored database program blocks
Objectives. Verification of software security is typically performed using dynamic and static analysis tools. The corresponding types of analysis do not usually consider the business logic of the software and do not rely on data access control policies. A modern approach to resolving this problem is...
Saved in:
| Main Author: | A. А. Timakov |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
MIREA - Russian Technological University
2024-04-01
|
| Series: | Российский технологический журнал |
| Subjects: | |
| Online Access: | https://www.rtj-mirea.ru/jour/article/view/877 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Equivalence, (Crypto) Morphism and Other Theoretical Tools for the Study of Information
by: Marcin J. Schroeder
Published: (2020-05-01) -
Information Structure Representation And Extraction From A Corpus Of Patient Data, Using An Ontology
by: Christian Cote
Published: (2008-07-01) -
Invulnerability invariants for software controlled speculation
by: Nimish Mathure, et al.
Published: (2024-12-01) -
Automation of Formal Verification of Programs in the Pifagor Language
by: M. S. Ushakova, et al.
Published: (2015-08-01) -
The impact of semantic clustering on the learning of abstract words
by: Tomoko Ishii
Published: (2017-04-01)