A fuzzy-based technique for describing security requirements of intrusion tolerant systems

To care for security in early stages of software development has always been a major engineering trend. However, due to the existence of unpreventable and accidental security faults within the system, it is not always possible to entirely identify and mitigate the security threats. This may eventua...

Full description

Saved in:
Bibliographic Details
Main Authors: Mougouei, Davoud, Wan Ab. Rahman, Wan Nurhayati
Format: Article
Language:English
Published: Science & Engineering Research Support Society 2013
Online Access:http://psasir.upm.edu.my/id/eprint/30570/1/A%20fuzzy.pdf
http://psasir.upm.edu.my/id/eprint/30570/
http://www.sersc.org/journals/IJSEIA/vol7_no2_2013.php
Tags: Add Tag
No Tags, Be the first to tag this record!