2018
DOI: 10.1007/978-3-319-76451-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Writing Security Specification with Things That Flow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…For the sake of self-contained paper, the FM model is briefly reviewed in the next section. This model has been utilized as a tool in several fields, including software engineering, business processes, and engineering design [14][15][16][17][18][19][20].…”
Section: B Problemmentioning
confidence: 99%
See 2 more Smart Citations
“…For the sake of self-contained paper, the FM model is briefly reviewed in the next section. This model has been utilized as a tool in several fields, including software engineering, business processes, and engineering design [14][15][16][17][18][19][20].…”
Section: B Problemmentioning
confidence: 99%
“…An employee creates the purchase request in (9) which in turn is transferred through the system (10) and received by the supervisor (11). Once the supervisor receives the request,  If the employee is not authorized to place the request, a cancellation is created (12) that flows to the system (13) and creates a cancellation response (14) that is sent to the employee as a feedback (15).  If the purchase price exceeds the limit, a rejection is created (16) that flows through the system (17) to be received by the manager (18).…”
Section: Fm Static Description For Handling a Purchase Requisitionmentioning
confidence: 99%
See 1 more Smart Citation