Login / Signup

Analysing security requirements patterns based on problems decomposition and composition.

Yuhong WenHaihong ZhaoLin Liu
Published in: RePa (2011)
Keyphrases
  • security requirements
  • real time
  • smart card
  • security analysis
  • security patterns
  • access control
  • operating system
  • information security
  • security properties
  • security problems