Requirements-driven adaptive security: Protecting variable assets at runtime.
Mazeiar SalehieLiliana PasqualeInah OmoronyiaRaian AliBashar NuseibehPublished in: RE (2012)
Keyphrases
- access control
- functional requirements
- data driven
- quality aware
- security issues
- inference control
- intrusion detection
- network security
- security policies
- information security
- user requirements
- computer security
- data security
- end users
- security management
- security problems
- data protection
- security properties
- key management
- sensitive data
- statistical databases