"Analysing Security Requirements of Information Systems Using Tropos."

Haralambos Mouratidis et al. (2003)

Details and statistics

DOI:

access: unavailable

type: Conference or Workshop Paper

metadata version: 2017-02-02

a service of  Schloss Dagstuhl - Leibniz Center for Informatics