Login / Signup

Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion.

Ali Nasrat HaidarAli E. Abdallah
Published in: ISoLA (2008)
Keyphrases