Login / Signup
Identifying and Implementing Security Patterns for a Dependable Security Case - From Security Patterns to D-Case.
Vaise Patu
Shuichiro Yamamoto
Published in:
CSE (2013)
Keyphrases
</>
security patterns
security requirements
formal model
security properties
requirements engineering
real world
artificial intelligence
information systems
smart card
early stage
security policies
security analysis