Do secure information system design methods provide adequate modeling support?

2008 ◽  
Vol 50 (9-10) ◽  
pp. 1035-1053 ◽  
Author(s):  
Mikko Siponen ◽  
Juhani Heikka
1999 ◽  
Vol 44 (3) ◽  
pp. 229-240 ◽  
Author(s):  
John Harrison ◽  
Wie Ming Lim ◽  
Anna Andrusiewicz ◽  
Anthony Berglas

Sign in / Sign up

Export Citation Format

Share Document