Cited By
View all- Chechik MDi Ruscio D(2018)Report from the 9th Workshop on Modelling in Software Engineering(MiSE 2017)ACM SIGSOFT Software Engineering Notes10.1145/3149485.314952042:4(21-24)Online publication date: 11-Jan-2018
In today's world, software is ubiquitous and relied upon to perform many important and critical functions. Unfortunately, software is riddled with security vulnerabilities that invite exploitation. Attackers are particularly attracted to software ...
To avoid prohibitively expensive remediation costs associated with the exposure of personally identifiable information (PII), scans of systems can be run proactively to help find and remove sensitive data. System disks can also be encrypted to obfuscate ...
The development of a frontier-free internal market and of the so-called 'information society' have resulted in an increase in the flow of personal data between EU member states. To remove potential obstacles to such transfers, data protection ...
IEEE Press
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in