![](/img/cover-not-exists.png)
A technique for expressing IT security objectives
Jussipekka Leiwo, Lam-For Kwok, Douglas L. Maskell, Nenad StankovicVolume:
48
Year:
2006
Language:
english
Pages:
8
DOI:
10.1016/j.infsof.2005.05.008
File:
PDF, 201 KB
english, 2006