Login / Signup

On the design of more secure software-intensive systems by use of attack patterns.

Michael GegickLaurie A. Williams
Published in: Inf. Softw. Technol. (2007)
Keyphrases
  • software intensive systems
  • real time
  • design patterns
  • information systems
  • cooperative
  • design process
  • authentication protocol
  • e learning
  • case study
  • low cost
  • software systems