C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Analysing security requirements patterns based on problems decomposition and composition.
Yuhong Wen
Haihong Zhao
Lin Liu
Published in:
RePa (2011)
Keyphrases
</>
security requirements
real time
smart card
security analysis
security patterns
access control
operating system
information security
security properties
security problems