Extrapolating security requirements to an established software process: Version 1.0.
Galoh Rashidah HaronKang Siong NgPublished in: ICITST (2011)
Keyphrases
- security requirements
- software process
- requirements engineering
- information security
- iso iec
- smart card
- process improvement
- security analysis
- software process improvement
- security policies
- software architecture
- process model
- access control
- software development
- security mechanisms
- security properties
- product quality
- software engineering
- machine learning
- software projects
- data mining
- software quality
- decision making