Login / Signup

Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment.

Haruhiko KaiyaJunya SakaiShinpei OgataKenji Kaijiri
Published in: Int. J. Secur. Softw. Eng. (2013)
Keyphrases