Describing Early Security Requirements Using Use Case Maps.
Jameleddine HassineAbdelwahab Hamou-LhadjPublished in: SDL Forum (2015)
Keyphrases
- security requirements
- security analysis
- smart card
- security properties
- access control
- information security
- security concerns
- security policies
- security model
- security problems
- software architecture
- security mechanisms
- reference models
- covert channel
- mobile commerce
- relational databases
- information systems
- secure electronic
- security patterns
- object oriented
- multi agent