Developing Secure Systems with UMLsec From Business Processes to Implementation
In practice, security of computer systems is compromised most often not by breaking dedicated mechanisms (such as security protocols), but by exploiting..
Sorry, we are unable to provide the full text but you may find it at the following location(s):
http://citeseerx.ist.psu.edu/v... (external link)
http://www4.in.tum.de/~juerjen... (external link)