Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6948269 | Information and Software Technology | 2015 | 83 Pages |
Abstract
Using our proposal, developers, architects and researchers can analyze and engineer security methodologies in a structured, systematic fashion, taking into account all security methodology aspects.
Related Topics
Physical Sciences and Engineering
Computer Science
Human-Computer Interaction
Authors
Anton V. Uzunov, Katrina Falkner, Eduardo B. Fernandez,