Method to detect leaks of use case in security requirement analysis
LI Xiao-hong,WANG Xiang-yu,FENG Zhi-yong
Computer Engineering and Applications . 2010, (5): 51 -54 .  DOI: 10.3778/j.issn.1002-8331.2010.05.016