Amanote Research
Register
Sign In
Arguing Satisfaction of Security Requirements
doi 10.4018/978-1-59904-147-6.ch002
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2007
Authors
C. B. Haley
R. Laney
J. D. Moffett
B. Nuseibeh
Publisher
IGI Global
Related search
Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources
Complex Systems Informatics and Modeling Quarterly
Security and Reliability Requirements for Advanced Security Event Management
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Arguing a Fortiori
Modern Law Review
Law
Analysis of Security Requirements of Futuristic Mobile Applications
International Journal of Information Sciences and Techniques
Requirements and Specifications for Adaptive Security
Job Security, Satisfaction Influence Work Commitment
Newspaper Research Journal
Communication
Preliminary Security Requirements for SecureCore Hardware
Security Requirements Elicitation From Airline Turnaround Processes
Wirtschaftsinformatik
Information Systems
Holistic Security Requirements Analysis: An Attacker's Perspective