Login / Signup
Using Abuse Case Models for Security Requirements Analysis.
John P. McDermott
Chris Fox
Published in:
ACSAC (1999)
Keyphrases
</>
requirements analysis
access control
database
machine learning
information technology
knowledge acquisition
goal oriented
real world
data analysis
user interface