Security Requirements Prioritization Based on Threat Modeling and Valuation Graph

Keunyoung Park, Sang Guun Yoo, Juho Kim. Security Requirements Prioritization Based on Threat Modeling and Valuation Graph. In Geuk Lee, Daniel Howard, Dominik Slezak, editors, Convergence and Hybrid Information Technology - 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings. Volume 206 of Communications in Computer and Information Science, pages 142-152, Springer, 2011. [doi]

Abstract

Abstract is missing.