MLA
Beckers, Kristian, et al. "A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain." IJSSE vol.5, no.2 2014: pp.20-43. http://doi.org/10.4018/ijsse.2014040102
APA
Beckers, K., Côté, I., Goeke, L., Güler, S., & Heisel, M. (2014). A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain. International Journal of Secure Software Engineering (IJSSE), 5(2), 20-43. http://doi.org/10.4018/ijsse.2014040102
Chicago
Beckers, Kristian, et al. "A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain," International Journal of Secure Software Engineering (IJSSE) 5, no.2: 20-43. http://doi.org/10.4018/ijsse.2014040102
Export Reference