A rigorous methodology for security architecture modeling and verification

Yomna Ali, Sherif El-Kassas. A rigorous methodology for security architecture modeling and verification. In Frederick T. Sheldon, Axel W. Krings, Robert K. Abercrombie, Ali Mili, editors, Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008. ACM, 2008. [doi]

@inproceedings{AliE08,
  title = {A rigorous methodology for security architecture modeling and verification},
  author = {Yomna Ali and Sherif El-Kassas},
  year = {2008},
  doi = {10.1145/1413140.1413155},
  url = {https://doi.org/10.1145/1413140.1413155},
  researchr = {https://researchr.org/publication/AliE08},
  cites = {0},
  citedby = {0},
  booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008},
  editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili},
  publisher = {ACM},
  isbn = {978-1-60558-098-2},
}