• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Analysing security requirements patterns based on problems decomposition and composition.

Yuhong WenHaihong ZhaoLin Liu
Published in: RePa (2011)
Keyphrases
  • security requirements
  • real time
  • smart card
  • security analysis
  • security patterns
  • access control
  • operating system
  • information security
  • security properties
  • security problems