Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements.
Chad HeitzenraterAndrew C. SimpsonPublished in: ARES (2016)
Keyphrases
- utility function
- security requirements
- security policies
- security analysis
- smart card
- security properties
- multi attribute
- access control
- security mechanisms
- decision theory
- software architecture
- decision makers
- information security
- decision problems
- expected utility
- preference elicitation
- probability distribution
- quasi linear
- risk sensitive
- security patterns
- secure electronic
- intrusion detection system
- anomaly detection
- security protocols
- social welfare
- neural network
- network security
- cooperative
- information systems