Logo des Repositoriums
 

Capturing and Documentation of Decisions in Security Requirements Engeneering through Heuristics

dc.contributor.authorGärtner, Stefan
dc.contributor.authorHesse, Tom-Michael
dc.contributor.authorSchneider, Kurt
dc.contributor.authorPaech, Barbara
dc.date.accessioned2017-12-06T09:24:53Z
dc.date.available2017-12-06T09:24:53Z
dc.date.issued2014
dc.identifier.doi10.1007/s40568-014-0011-2
dc.identifier.pissn0720-8928
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/8802
dc.language.isode
dc.publisherKöllen Druck & Verlag GmbH
dc.relation.ispartofSoftwaretechnik-Trends: Vol. 34, No. 1
dc.relation.ispartofseriesSoftwaretechnik-Trends
dc.titleCapturing and Documentation of Decisions in Security Requirements Engeneering through Heuristicsde
dc.typeText/Journal Article
gi.citation.endPage22
gi.citation.startPage21

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
40568_2014_Article_11.pdf
Größe:
126.05 KB
Format:
Adobe Portable Document Format