Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Enhanced Misuse Case Model: A Security Requirement Analysis and Specification Model
An information security system of public or private organization should be developed securely and cost-effectively by using security engineering and software engineering technologies, as well as a security req...