Eliciting usable security requirements with misusability cases.
Shamal FailyIvan FlechaisPublished in: RE (2011)
Keyphrases
- security requirements
- smart card
- security properties
- security analysis
- security concerns
- information security
- access control
- security problems
- security policies
- software architecture
- security model
- security mechanisms
- mobile commerce
- reference models
- security patterns
- covert channel
- artificial intelligence
- database systems
- distributed systems
- information technology
- high level
- information systems
- real time
- secure electronic