Login / Signup
Executable misuse cases for modeling security concerns.
Jon Whittle
Duminda Wijesekera
Mark Hartong
Published in:
ICSE (2008)
Keyphrases
</>
security concerns
security policies
security requirements
anomaly detection
management system
access control
lightweight
data privacy
security threats