Automated analysis of security requirements through risk-based argumentation.
Yijun YuVirginia N. L. FranqueiraThein Than TunRoel J. WieringaBashar NuseibehPublished in: J. Syst. Softw. (2015)
Keyphrases
- automated analysis
- security requirements
- smart card
- security analysis
- information security
- security properties
- security mechanisms
- security policies
- visual analysis
- access control
- biomedical imaging
- security model
- software architecture
- security concerns
- mobile commerce
- development lifecycle
- security patterns
- mobile devices
- network security
- information systems
- secure electronic