Model-based security analysis in seven steps — a guided tour to the CORAS method

Author: Braber F.   Hogganvik I.   Lund M.   Stølen K.   Vraalsen F.  

Publisher: Springer Publishing Company

ISSN: 1358-3948

Source: BT Technology Journal, Vol.25, Iss.1, 2007-01, pp. : 101-117

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract