Capturing Security Requirements Using Essential Use Cases (EUCs).
Syazwani YahyaMassila KamalrudinSafiah SidekJohn C. GrundyPublished in: APRES (2014)
Keyphrases
- security requirements
- security analysis
- smart card
- security properties
- access control
- security policies
- security problems
- information security
- software architecture
- security model
- security concerns
- mobile commerce
- security mechanisms
- security patterns
- development lifecycle
- case study
- secure electronic
- reference models
- relational databases
- database systems
- high level