Inproceedings,

Modeling Security Requirements Through Ownership, Permission and Delegation.

, , , and .
RE, page 167-176. IEEE Computer Society, (2005)

Meta data

Tags

Users

  • @dblp

Comments and Reviews