Login / Signup

Using Abuse Case Models for Security Requirements Analysis.

John P. McDermottChris Fox
Published in: ACSAC (1999)
Keyphrases
  • requirements analysis
  • access control
  • database
  • machine learning
  • information technology
  • knowledge acquisition
  • goal oriented
  • real world
  • data analysis
  • user interface