Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems.
Naveed IkramSurayya SiddiquiNaurin Farooq KhanPublished in: EmpiRE (2014)
Keyphrases
- information systems
- information security
- information assurance
- countermeasures
- security policies
- security issues
- access control
- information technology
- network security
- security requirements
- utility function
- intrusion detection
- statistical databases
- anomaly detection
- security problems
- neural network
- security management
- enterprise wide
- security analysis
- computer security
- personal data
- security mechanisms
- low cost
- health care
- intrusion detection system