Session 3-Security Requirements and Development-Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes [Book Review]

In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4083--51 (2006)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,349

External links

  • This entry has no external links. Add one.
Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Are there process-requirements of rationality?Julian Fink - 2011 - Organon F: Medzinárodný Časopis Pre Analytickú Filozofiu 18 (4):475-488.
Reve{a,i}ling the Risks.Wolter Pieters - 2010 - Techné: Research in Philosophy and Technology 14 (3):194-206.
How Does Coherence Matter?Niko Kolodny - 2007 - Proceedings of the Aristotelian Society 107 (1pt3):229 - 263.
Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.

Analytics

Added to PP
2014-01-28

Downloads
2 (#1,780,599)

6 months
1 (#1,533,009)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references