Keyphrases
Security Threats
100%
Home Environment
100%
Home Network
100%
Security Requirements
100%
Master's Thesis
100%
Java-based
100%
Protection Profile
75%
Java
50%
Security Environment
50%
Software Distribution
50%
Distribution Platform
50%
Evaluation Criteria
25%
Control Flow
25%
Confidentiality
25%
Cryptographic Techniques
25%
Requirements Specification
25%
Access to Information
25%
Security Model
25%
Security Framework
25%
Access Control
25%
Application Programming Interface
25%
Corporate
25%
Distributed Computing Environment
25%
Public Key Infrastructure
25%
Office Network
25%
Networked Software
25%
Security Practices
25%
Security Features
25%
Java Application
25%
Using Knowledge
25%
Security Evaluation
25%
Authentication Framework
25%
Java Security
25%
Information Flow Policy
25%
Special Characteristic
25%
Common Criteria
25%
INIS
applications
100%
environment
100%
security
100%
java
100%
computer codes
30%
protection
30%
distribution
20%
evaluation
20%
comparative evaluations
10%
control
10%
information
10%
policy
10%
interfaces
10%
availability
10%
specifications
10%
authentication
10%
cryptography
10%
programming
10%
Computer Science
Home Environment
100%
Security Environment
50%
Authentication
25%
Control Flow
25%
Cryptographic Technique
25%
Access Control
25%
Security Model
25%
Security Requirements
25%
Distributed Computing Environment
25%
Security Framework
25%
Common Criterion
25%
Public Key Infrastructure
25%
Security Evaluation
25%
Java Application
25%
Security Technique
25%
Security Feature
25%
Requirement Specification
25%
Evaluation Criterion
25%
Application Programming Interface
25%