Login / Signup

Model-Based Argument Analysis for Evolving Security Requirements.

Thein Than TunYijun YuCharles B. HaleyBashar Nuseibeh
Published in: SSIRI (2010)
Keyphrases
  • security requirements
  • data analysis
  • smart card
  • security concerns
  • operating system
  • security policies