Login / Signup

A Rigorous Methodology for Security Architecture Modeling and Verification.

Yomna AliSherif El-KassasMohy Mahmoud
Published in: HICSS (2009)
Keyphrases
  • security architecture
  • security model
  • databases
  • data integrity
  • web services
  • association rules
  • computational intelligence
  • access control