Summary
The methodology will guide users for applying the security requirements automated generation and protection and prevention activities driven by formal specifications.
More information & hyperlinks