Login / Signup

Analysis and Component-based Realization of Security Requirements.

Denis HateburMaritta HeiselHolger Schmidt
Published in: ARES (2008)
Keyphrases
  • security requirements
  • real world
  • open source
  • security properties
  • security concerns