Legally "reasonable" security requirements: A 10-year FTC retrospective.
Travis D. BreauxDavid L. BaumerPublished in: Comput. Secur. (2011)
Keyphrases
- security requirements
- smart card
- information security
- security analysis
- security problems
- access control
- security properties
- security mechanisms
- security concerns
- security policies
- security model
- reference models
- software architecture
- mobile commerce
- covert channel
- security patterns
- secure electronic
- network security
- unsupervised learning
- data processing
- distributed systems
- open source
- relational databases