|
Volumn 2, Issue , 2005, Pages 398-403
|
Misuse case-based design and analysis of secure software architecture
|
Author keywords
Misuse case; Security; Software architecture; Use case
|
Indexed keywords
COMPUTER ARCHITECTURE;
COMPUTER SOFTWARE;
HOSPITAL DATA PROCESSING;
INFORMATION ANALYSIS;
SECURITY SYSTEMS;
MISUSE CASE;
SECURITY;
SOFTWARE ARCHITECTURE;
USE CASE;
INFORMATION TECHNOLOGY;
|
EID: 24744457547
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/itcc.2005.199 Document Type: Conference Paper |
Times cited : (30)
|
References (15)
|