Dongsoo Jang

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
This paper describes an approach to modeling security threats to applications and to deriving security failure-tolerant requirements from the threats. This paper assumes that unbreakable core security services for applications, such as authentication, access control, cryptosystem, or digital signature, are broken all the time in a real-world setting. The(More)
  • 1