Login / Signup

Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns.

Raimundas MatuleviciusNaved Ahmed
Published in: it Inf. Technol. (2013)
Keyphrases