Contracts for security adaptation.
José Antonio MartínErnesto PimentelPublished in: J. Log. Algebraic Methods Program. (2011)
Keyphrases
- information security
- security issues
- information assurance
- security systems
- access control
- security policies
- supply chain
- security requirements
- network security
- intrusion detection
- statistical databases
- security management
- functional requirements
- security problems
- security properties
- security level
- security threats
- computer security
- adaptation process
- security measures
- high security
- data security
- cyber security
- security analysis
- e learning
- electronic commerce
- database systems