Holistic security requirements analysis for socio-technical systems. Li, T., Horkoff, J., & Mylopoulos, J. Softw. Syst. Model., 17(4):1253–1285, 2018. Paper doi bibtex @article{DBLP:journals/sosym/LiHM18,
author = {Tong Li and
Jennifer Horkoff and
John Mylopoulos},
title = {Holistic security requirements analysis for socio-technical systems},
journal = {Softw. Syst. Model.},
volume = {17},
number = {4},
pages = {1253--1285},
year = {2018},
url = {https://doi.org/10.1007/s10270-016-0560-y},
doi = {10.1007/S10270-016-0560-Y},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/sosym/LiHM18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"Yi6dbd56fivyHSTAJ","bibbaseid":"li-horkoff-mylopoulos-holisticsecurityrequirementsanalysisforsociotechnicalsystems-2018","author_short":["Li, T.","Horkoff, J.","Mylopoulos, J."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Tong"],"propositions":[],"lastnames":["Li"],"suffixes":[]},{"firstnames":["Jennifer"],"propositions":[],"lastnames":["Horkoff"],"suffixes":[]},{"firstnames":["John"],"propositions":[],"lastnames":["Mylopoulos"],"suffixes":[]}],"title":"Holistic security requirements analysis for socio-technical systems","journal":"Softw. Syst. Model.","volume":"17","number":"4","pages":"1253–1285","year":"2018","url":"https://doi.org/10.1007/s10270-016-0560-y","doi":"10.1007/S10270-016-0560-Y","timestamp":"Mon, 28 Aug 2023 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/sosym/LiHM18.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/sosym/LiHM18,\n author = {Tong Li and\n Jennifer Horkoff and\n John Mylopoulos},\n title = {Holistic security requirements analysis for socio-technical systems},\n journal = {Softw. Syst. Model.},\n volume = {17},\n number = {4},\n pages = {1253--1285},\n year = {2018},\n url = {https://doi.org/10.1007/s10270-016-0560-y},\n doi = {10.1007/S10270-016-0560-Y},\n timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/sosym/LiHM18.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Li, T.","Horkoff, J.","Mylopoulos, J."],"key":"DBLP:journals/sosym/LiHM18","id":"DBLP:journals/sosym/LiHM18","bibbaseid":"li-horkoff-mylopoulos-holisticsecurityrequirementsanalysisforsociotechnicalsystems-2018","role":"author","urls":{"Paper":"https://doi.org/10.1007/s10270-016-0560-y"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/92/5983.bib","dataSources":["dyTcuGxD57LtbxsL3"],"keywords":[],"search_terms":["holistic","security","requirements","analysis","socio","technical","systems","li","horkoff","mylopoulos"],"title":"Holistic security requirements analysis for socio-technical systems","year":2018}