Managing security requirements patterns using feature diagram hierarchies.
Rocky SlavinJean-Michel LehkerJianwei NiuTravis D. BreauxPublished in: RE (2014)
Keyphrases
- security requirements
- security patterns
- smart card
- security analysis
- security policies
- security properties
- information security
- security model
- access control
- security concerns
- security mechanisms
- software architecture
- security problems
- network security
- reference models
- requirements engineering
- mobile commerce
- formal model