Modeling Security Requirements Through Ownership, Permission and Delegation (0)

by P Giorgini, F Massacci, J Mylopoulos, N Zannone
Venue:In proc. of RE