Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location
Author(s) -
Seongchae Seo,
Jin-Ho You,
Youngdae Kim,
Byung-Ki Kim
Publication year - 2006
Publication title -
the kips transactions partd
Language(s) - English
Resource type - Journals
ISSN - 1598-2866
DOI - 10.3745/kipstd.2006.13d.1.067
Subject(s) - software security assurance , security testing , computer security , computer science , identification (biology) , security engineering , security through obscurity , security bug , computer security model , security information and event management , security service , cloud computing security , information security , cloud computing , botany , biology , operating system
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom