z-logo
open-access-imgOpen Access
Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location
Author(s) -
Seo Seong-Chae,
You Jin-Ho,
Young-Dae Kim,
Byung-Ki Kim
Publication year - 2006
Publication title -
jeongbo cheo'li haghoe nonmunji. d
Language(s) - English
Resource type - Journals
ISSN - 1598-2866
DOI - 10.3745/kipstd.2006.13d.1.067
Subject(s) - software security assurance , security testing , computer security , computer science , identification (biology) , security engineering , security through obscurity , security bug , computer security model , security information and event management , security service , cloud computing security , information security , cloud computing , botany , biology , operating system

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here