Modeling Security Requirements Through Ownership, Permission and Delegation

doi 10.1109/re.2005.43
Full Text
Abstract

Available in full text

Date
Authors
Publisher

IEEE