Login / Signup
Analysing security requirements patterns based on problems decomposition and composition.
Yuhong Wen
Haihong Zhao
Lin Liu
Published in:
RePa (2011)
Keyphrases
</>
security requirements
real time
smart card
security analysis
security patterns
access control
operating system
information security
security properties
security problems