z-logo
open-access-imgOpen Access
Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location
Author(s) -
Seongchae Seo,
Jin-Ho You,
Youngdae Kim,
Byung-Ki Kim
Publication year - 2006
Publication title -
the kips transactions partd
Language(s) - English
Resource type - Journals
ISSN - 1598-2866
DOI - 10.3745/kipstd.2006.13d.1.067
Subject(s) - software security assurance , security testing , computer security , computer science , identification (biology) , security engineering , security through obscurity , security bug , computer security model , security information and event management , security service , cloud computing security , information security , cloud computing , botany , biology , operating system

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom