@dblp

Designing Security Requirements Models Through Planning.

, , , and . CAiSE, volume 4001 of Lecture Notes in Computer Science, page 33-47. Springer, (2006)

Links and resources

Tags