Login / Signup
Model-Based Argument Analysis for Evolving Security Requirements.
Thein Than Tun
Yijun Yu
Charles B. Haley
Bashar Nuseibeh
Published in:
SSIRI (2010)
Keyphrases
</>
security requirements
data analysis
smart card
security concerns
operating system
security policies