Formalization of security patterns as a means to infer security controls in business processes

Logic Journal of the IGPL 23 (1):57-72 (2015)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 101,270

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

GenAI Application Level Security.Ken Huang, Grace Huang, Adam Dawson & Daniel Wu - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 199-237.
Taking Security Seriously.Casadei Thomas - 2017 - Governare la Paura. Journal of Interdisciplinary Studies 10 (1).

Analytics

Added to PP
2016-06-30

Downloads
13 (#1,327,971)

6 months
3 (#1,479,050)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references