Sign in

Integrating privacy requirements considerations into a security requirements engineering method and tool.

Nancy R. MeadSeiya MiyazakiJustin Zhan
Published in: Int. J. Inf. Priv. Secur. Integr. (2011)
Keyphrases
  • requirements engineering
  • software engineering
  • input data
  • information systems
  • wireless sensor networks
  • intrusion detection
  • literature review