Toward A Code Pattern Based Vulnerability Measurement Model
SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies Indianapolis Indiana USA June, 2018, pp. 209-211, 2018.
EI
Abstract:
Many access control patterns, both positive and negative, have been identified in the past. However, there is little research describing how to leverage those patterns for the detection of access control bugs in code. Many software bug detection models and frameworks for access control exist, however most of these approaches and tools are...More
Code:
Data:
Get fulltext within 24h
Upload PDF
1.Your uploaded documents will be check within 24h, and coins will be credited to your account.
2.As the current system does not support cash withdrawal, you can add staff WeChat (AMxiaomai) to receive it as a red packet.
3.10 coins will be exchanged for 1 yuan.
?
¥
Upload a single paper
for 5 coins
Wechat's Red Packet
?
¥
Upload 50 articles
for 250 coins
Wechat's Red Packet
?
¥
Upload 200 articles
for 1000 coins
Wechat's Red Packet
?
¥
Upload 500 articles
for 2500 coins
Wechat's Red Packet
?
¥
Upload 1000 articles
for 5000 coins
Wechat's Red Packet
Tags
Comments