Sign in

Formalizing information security requirements.

Mariana GerberRossouw von SolmsPaul L. Overbeek
Published in: Inf. Manag. Comput. Secur. (2001)
Keyphrases
  • security requirements
  • object oriented
  • databases
  • real world
  • case study
  • security protocols