Author:
Karpati Peter,Opdahl Andreas L.,Sindre Guttorm
Subject
Hardware and Architecture,Information Systems,Software
Reference110 articles.
1. A rigorous methodology for security architecture modeling and verification;Ali,2009
2. Fundamentals of Computer Security Technology;Amoroso,1994
3. Amyot, D., 1999. Use case maps quick tutorial. http://www.usecasemaps.org/pub/UCMtutorial/UCMtutorial.pdf.
4. Evaluating the effect of a delegated versus centralized control style on the maintainability of object-oriented software;Arisholm;IEEE Trans. Softw. Eng.,2004
5. Model driven security: From UML models to access control infrastructures;Basin;ACM Trans. Softw. Eng. Methodol. (TOSEM),2006
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献