|
Volumn 2, Issue 3, 2003, Pages 53-64
|
Security use cases
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ADMINISTRATIVE DATA PROCESSING;
AUTOMATIC TELLER MACHINES;
DATABASE SYSTEMS;
MATHEMATICAL MODELS;
PROGRAM DOCUMENTATION;
SECURITY OF DATA;
ACCESS CONTROL;
SECURITY MECHANISMS;
SECURITY USE CASES;
USE CASE MODELING;
COMPUTER SCIENCE;
|
EID: 2942713443
PISSN: 16601769
EISSN: None
Source Type: Journal
DOI: 10.5381/jot.2003.2.3.c6 Document Type: Review |
Times cited : (153)
|
References (3)
|