Cited By
View all- Shoniregun CDube KMtenzi FShoniregun CDube KMtenzi F(2010)Laws and Standards for Secure e-Healthcare InformationElectronic Healthcare Information Security10.1007/978-0-387-84919-5_3(59-100)Online publication date: 2010
- Morimoto SHorie DCheng J(2006)A security requirement management database based on ISO/IEC 15408Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III10.1007/11751595_1(1-10)Online publication date: 8-May-2006
- Morimoto SJingde Cheng (2005)Patterning Protection Profiles by UML for Security SpecificationsInternational Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)10.1109/CIMCA.2005.1631590(946-951)Online publication date: 2005