Login / Signup

Detecting repurposing and over-collection in multi-party privacy requirements specifications.

Travis D. BreauxDaniel SmullenHanan Hibshi
Published in: RE (2015)
Keyphrases