Cited By
View all- Karpati POpdahl ASindre G(2013)HARM: Hacker Attack Representation MethodSoftware and Data Technologies10.1007/978-3-642-29578-2_10(156-175)Online publication date: 2013
- Satoh FNakamura YMukhi NTatsubori MOno K(2011)Model-Driven Approach for End-to-End SOA Security ConfigurationsNon-Functional Properties in Service Oriented Architecture10.4018/978-1-60566-794-2.ch012(268-298)Online publication date: 2011
- Shariati MBahmani FShams F(2011)Enterprise information security, a review of architectures and frameworks from interoperability perspectiveProcedia Computer Science10.1016/j.procs.2010.12.0893(537-543)Online publication date: 2011
- Show More Cited By