The Security Requirements Behavior Model for Trustworthy Software

  • Authors:
  • Kassem Saleh;Maryam Habil

  • Affiliations:
  • -;-

  • Venue:
  • MCETECH '08 Proceedings of the 2008 International MCETECH Conference on e-Technologies
  • Year:
  • 2008

Quantified Score

Hi-index 0.01

Visualization

Abstract

A number of recent initiatives in both academia and industry have sought to achieve improvements in e-businesses through the utilization of Business Process Management (BPM) methodologies and tools. However there are still some inadequacies that need ...