Sign in

Resolving vulnerability identification errors using security requirements on business process models.

Stefan TaubenbergerJan JürjensYijun YuBashar Nuseibeh
Published in: Inf. Manag. Comput. Secur. (2013)
Keyphrases