CMU

biblio

Visible to the public Managing security requirements patterns using feature diagram hierarchies

biblio

Visible to the public Characterizations and boundaries of security requirements patterns