Engaging Stakeholders during Late Stage Security Design with Assumption Personas

This source preferred by Shamal Faily

Authors: Faily, S.

Editors: Furnell, S.

http://eprints.bournemouth.ac.uk/22704/

Journal: Information and Computer Security

Volume: 23

Issue: 4

Pages: 435-446

Publisher: Emerald

This data was imported from DBLP:

Authors: Faily, S.

http://eprints.bournemouth.ac.uk/22704/

Journal: Inf. & Comput. Security

Volume: 23

Pages: 435-446

DOI: 10.1108/ICS-10-2014-0066

The data on this page was last updated at 04:42 on September 24, 2017.