Login / Signup

From misuse cases to mal-activity diagrams: bridging the gap between functional security analysis and design.

Mohamed El-Attar
Published in: Softw. Syst. Model. (2014)
Keyphrases
  • security analysis
  • public key
  • case study
  • sequence diagrams
  • database
  • data structure
  • multi agent systems
  • image quality
  • object oriented systems
  • activity diagrams