Abstract
In this chapter, on Mal-activities for Security Risk Management, introduces security risk management extensions to mal-activity diagrams, another languages of the UML family. The chapter illustrates how to analyse dynamic aspects of secure software system development.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Matulevičius, R. (2017). Mal-activities for Security Risk Management. In: Fundamentals of Secure System Modelling. Springer, Cham. https://doi.org/10.1007/978-3-319-61717-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-61717-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61716-9
Online ISBN: 978-3-319-61717-6
eBook Packages: Computer ScienceComputer Science (R0)