MLA
Beckers, Kristian, et al. "A Structured Method for Security Requirements Elicitation Concerning the Cloud Computing Domain." Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2018, pp. 782-805. https://doi.org/10.4018/978-1-5225-3923-0.ch031
APA
Beckers, K., Côté, I., Goeke, L., Güler, S., & Heisel, M. (2018). A Structured Method for Security Requirements Elicitation Concerning the Cloud Computing Domain. In I. Management Association (Ed.), Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications (pp. 782-805). IGI Global. https://doi.org/10.4018/978-1-5225-3923-0.ch031
Chicago
Beckers, Kristian, et al. "A Structured Method for Security Requirements Elicitation Concerning the Cloud Computing Domain." In Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 782-805. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-3923-0.ch031
Export Reference