![](https://www.pdfsearch.io/img/b1e42d47453647420670fc30b6a24151.jpg) Date: 2015-03-12 04:54:52
| | A Model for Structuring and Reusing Security Requirements Sources and Security Requirements Christian Schmitt1 and Peter Liggesmeyer2, 3 1Add to Reading ListSource URL: ceur-ws.orgDownload Document from Source Website File Size: 1,26 MBShare Document on Facebook
|