Login / Signup
Formalizing information security requirements.
Mariana Gerber
Rossouw von Solms
Paul L. Overbeek
Published in:
Inf. Manag. Comput. Secur. (2001)
Keyphrases
</>
security requirements
object oriented
databases
real world
case study
security protocols