MLA
Kaiya, Haruhiko, et al. "Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment." IJSSE vol.4, no.3 2013: pp.42-63. http://doi.org/10.4018/jsse.2013070103
APA
Kaiya, H., Sakai, J., Ogata, S., & Kaijiri, K. (2013). Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment. International Journal of Secure Software Engineering (IJSSE), 4(3), 42-63. http://doi.org/10.4018/jsse.2013070103
Chicago
Kaiya, Haruhiko, et al. "Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment," International Journal of Secure Software Engineering (IJSSE) 4, no.3: 42-63. http://doi.org/10.4018/jsse.2013070103
Export Reference