Eliciting Security Requirements by Misuse Cases.
Guttorm SindreAndreas L. OpdahlPublished in: TOOLS (37) (2000)
Keyphrases
- security requirements
- security policies
- security analysis
- smart card
- security properties
- information security
- security concerns
- access control
- security mechanisms
- security model
- security problems
- security patterns
- software architecture
- reference models
- secure electronic
- goal oriented
- mobile commerce
- requirements engineering
- security protocols
- databases
- anomaly detection
- low cost
- association rules