Login / Signup
A Method for Eliciting Security Requirements from the Business Process Models.
Naved Ahmed
Raimundas Matulevicius
Published in:
CAiSE (Forum/Doctoral Consortium) (2014)
Keyphrases
</>
security requirements
database
databases
unsupervised learning
software architecture