Login / Signup

Software requirements and architecture modeling for evolving non-secure applications into secure applications.

Michael E. ShinHassan Gomaa
Published in: Sci. Comput. Program. (2007)
Keyphrases
  • security issues
  • security architecture
  • software requirements
  • security requirements
  • management system
  • cryptographic protocols
  • real world
  • learning objects
  • digital rights management