Vol-68⫷ Vol-69 ⫸Vol-70
urn:nbn:de:0074-69-0


Vol-69/paper-6⫷Vol-69/paper-7⫸Vol-69/paper-8

Modelling E-business Security Requirements: Developer and Client Expectations