Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment.
Haruhiko KaiyaJunya SakaiShinpei OgataKenji KaijiriPublished in: Int. J. Secur. Softw. Eng. (2013)
Keyphrases
- security requirements
- information systems
- information security
- requirements analysis
- smart card
- security analysis
- security properties
- security concerns
- security mechanisms
- security model
- access control
- security policies
- security problems
- requirements engineering
- reference models
- security patterns
- software architecture
- goal oriented
- databases
- mobile commerce
- intrusion detection
- information technology
- security protocols
- security issues
- network security
- real time
- secure electronic