Login / Signup
A Rigorous Methodology for Security Architecture Modeling and Verification.
Yomna Ali
Sherif El-Kassas
Mohy Mahmoud
Published in:
HICSS (2009)
Keyphrases
</>
security architecture
security model
databases
data integrity
web services
association rules
computational intelligence
access control