Selecting Security Patterns that Fulfill Security Requirements

Weiss, Michael and Mouratidis, Haralambos (2008) ‘Selecting Security Patterns that Fulfill Security Requirements’, 16th IEEE International Conference on Requirements Engineering. Barcelona, Spain, 8-12 Sep 2008.

Permanent Identifier

Use this permanent URL when citing or linking to this resource in ROAR.

Abstract

More Information

Divisions: Schools > Architecture Computing and Engineering, School of
Additional Information: Citation: Weiss, M., Mouratidis, H. (2008) Selecting Security Patterns that Fulfill Security Requirements., Proceedings of the 16th IEEE International Conference on Requirements Engineering, IEEE Computer Society, pp. 169-172.
Date Deposited: 07 Dec 2009 15:50
Official URL: http://doi.ieeecomputersociety.org/10.1109/RE.2008...
Item Type: Conference or Event Item (Paper)
Creators: Weiss, Michael and Mouratidis, Haralambos
Status: Published
Last Modified: 15 Oct 2012 15:36
Depositing User: Stephen Grace
PEER REVIEWED

Download

Version: Accepted Version

Licence: Creative Commons: Attribution-No Derivative Works 3.0

Statistics

View details