Login / Signup

Using trust assumptions with security requirements.

Charles B. HaleyRobin C. LaneyJonathan D. MoffettBashar Nuseibeh
Published in: Requir. Eng. (2006)
Keyphrases