Deriving security requirements from crosscutting threat descriptions.
Charles B. HaleyRobin C. LaneyBashar NuseibehPublished in: AOSD (2004)
Keyphrases
- security requirements
- aspect oriented
- security analysis
- smart card
- information security
- access control
- security mechanisms
- security concerns
- security properties
- security model
- aspect oriented programming
- object oriented
- crosscutting concerns
- software architecture
- security policies
- software development
- high level
- mobile commerce
- security patterns
- secure electronic
- covert channel
- timing constraints
- network security
- databases
- database