Login / Signup
A rigorous methodology for security architecture modeling and verification.
Yomna Ali
Sherif El-Kassas
Published in:
CSIIRW (2008)
Keyphrases
</>
security architecture
access control
mathematical modeling
information systems
simulation platform
database
databases
data management
intrusion detection system
security model
insider threat