![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Schultz E.E.
Publisher: Elsevier
ISSN: 1353-4858
Source: Network Security, Vol.2004, Iss.1, 2004-01, pp. : 6-9
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Security requirement analysis of business processes
By Herrmann Peter Herrmann Gaby
Electronic Commerce Research, Vol. 6, Iss. 3-4, 2006-10 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Security Analysis of Electronic Business Processes
By Röhrig Susanne Knorr Konstantin
Electronic Commerce Research, Vol. 4, Iss. 1-2, 2004-01 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)