Barry is not the weakest link: Eliciting Secure System Requirements with Personas
Auteurs principaux: | , |
---|---|
Format: | Conference item |
Publié: |
British Computer Society
2010
|
Résumé: |
---|
Auteurs principaux: | , |
---|---|
Format: | Conference item |
Publié: |
British Computer Society
2010
|
Résumé: |
---|