Login / Signup

Executable misuse cases for modeling security concerns.

Jon WhittleDuminda WijesekeraMark Hartong
Published in: ICSE (2008)
Keyphrases
  • security concerns
  • security policies
  • security requirements
  • anomaly detection
  • management system
  • access control
  • lightweight
  • data privacy
  • security threats