|
Volumn , Issue , 2008, Pages 235-238
|
The security requirements behavior model for trustworthy software
|
Author keywords
[No Author keywords available]
|
Indexed keywords
BEHAVIOR MODELING;
COMPUTER SECURITY;
CYBER SPACES;
FORMAL SECURITY;
OPERATIONAL MODELING;
SECURITY REQUIREMENTS;
SERVICE PROVIDERS;
SERVICE USERS;
TEST-CASE GENERATION;
TRUSTWORTHY WEB SERVICES;
USE CASES;
WEB APPLICATIONS;
WEB SERVICES SECURITY;
INFORMATION SERVICES;
SPECIFICATIONS;
TECHNOLOGY;
TELECOMMUNICATION SERVICES;
WEB SERVICES;
WORLD WIDE WEB;
|
EID: 50249179575
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/MCETECH.2008.19 Document Type: Conference Paper |
Times cited : (5)
|
References (6)
|