@inproceedings{6caf76325a0f41c085adfaea1737ac73,
title = "Weaving authentication and authorization requirements into the functional model of a system using Z promotion",
keywords = "Authentication, Authorization, Security Requirements, Weaving Security into Functional Models, Z Promotion, Z specification",
author = "Haidar, {Ali Nasrat} and Abdallah, {Ali E.}",
year = "2008",
doi = "10.1007/978-3-540-88479-8_59",
language = "English",
isbn = "3540884785",
series = "Communications in Computer and Information Science",
publisher = "Springer Verlag",
pages = "831--846",
booktitle = "Leveraging Applications of Formal Methods, Verification and Validation - Third International Symposium, ISoLA 2008, Proceedings",
}