×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [modelling security]
DOLCE extensions and applications Nicola Guarino Laboratory for Applied Ontology Institute for Cognitive Sciences and Technology, National Research Council
216 views
Describing Early Security Requirements using Use Case Maps Jameleddine Hassine King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia
[email protected]
214 views
DOLCE extensions and applications
46 views