Oct'14

biblio

Visible to the public Managing security requirements patterns using feature diagram hierarchies

file

Visible to the public Slavin_Managing_Sec_Requirements_TB.pdf

file

Visible to the public Omar_Safely_Composable_JA.pdf

file

Visible to the public Abi-Antoun_Are_Object_Graphs_Extracted.pdf

biblio

Visible to the public Rely-Guarantee Protocols

file

Visible to the public Camara_Impact_Models_DG.pdf