Author:
Kabasele Tenday Jean-Marie
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Al-Azzani, S.: Security Testing - RSMG 2 (2009), http://www.cs.bham.ac.uk
2. Bettini, C., Jajodia, S., Wang, S., Wijesekera, D.: Provisions and obligations in policy management and security applications. In: Proceedings of the 28th International Conference on Very Large Data Bases, VLDB Endowment, Hong Kong, pp. 502–513 (2002)
3. Devambu, P.T., Stubbelbine, S.: Software engineering for security: a roadmap. In: Future of Software Engineering, Special volume of the Proceedings of the 22nd Int. Conf. on Software Engineering (ICSE 2000), pp. 227–239 (2000)
4. Firesmith, D.: Security Use Cases. Journal of Object Technology 2(3), 53–64 (2003)
5. European Union: Directive 2004/39/EC on The Markets in Financial Instruments Directive (MiFID). Official Journal of the European Union (2004), http://eurlex.europa.eu
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献