Login / Signup
Software requirements and architecture modeling for evolving non-secure applications into secure applications.
Michael E. Shin
Hassan Gomaa
Published in:
Sci. Comput. Program. (2007)
Keyphrases
</>
security issues
security architecture
software requirements
security requirements
management system
cryptographic protocols
real world
learning objects
digital rights management