<--- Back to Details
First PageDocument Content
Date: 2015-03-12 04:54:52

A Model for Structuring and Reusing Security Requirements Sources and Security Requirements Christian Schmitt1 and Peter Liggesmeyer2, 3 1

Add to Reading List

Source URL: ceur-ws.org

Download Document from Source Website

File Size: 1,26 MB

Share Document on Facebook

Similar Documents