Skip to main navigation Skip to search Skip to main content

Validating and implementing security patterns for database applications

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Fingerprint

Dive into the research topics of 'Validating and implementing security patterns for database applications'. Together they form a unique fingerprint.
Sort by

Keyphrases

Computer Science