A technique to include computer security, safety, and resilience requirements as part of the requirements specification.
D. N. J. MostertSebastiaan H. von SolmsPublished in: J. Syst. Softw. (1995)
Keyphrases
- computer security
- requirements specification
- requirements engineering
- software requirements
- software engineering
- information security
- computer systems
- specification language
- anomaly detection
- software systems
- development process
- intrusion detection
- software development
- network intrusion detection
- network security
- functional requirements
- intrusion detection system
- systems development
- formal specification
- information technology
- smart card
- life cycle
- security requirements
- information systems
- case study