Skip to main content
Article thumbnail
Location of Repository

Developing Secure Systems with UMLsec From Business Processes to Implementation

By Jan Jürjens


In practice, security of computer systems is compromised most often not by breaking dedicated mechanisms (such as security protocols), but by exploiting..

Year: 2007
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.