共 74 条
[1]
ABUNIMEH S, 2009, INTEGRATING PRIVACY, P542
[2]
ALI R, 2008, 27 INT C CONC MOD ER
[3]
ALI R, 2009, 14 INT C EXPL MOD ME
[4]
[Anonymous], 2005, Int. Sugar J.
[6]
BASIN D, 2003, MODEL DRIVEN SECURIT, P100
[7]
BEST B, 2007, MODEL BASED SECURITY, P581
[8]
Eliciting security requirements through misuse activities
[J].
DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS,
2008,
:328-+
[10]
BRESCIANI P, 2004, J AUTONOMOUS AGENTS, V8, P203, DOI DOI 10.1023/B:AGNT.0000018806.20944.EF