Towards the selection of security tactics based on non-functional requirements: Security tactic planning poker.
Felipe OssesGastón MarquezCristian OrellanaHernán AstudilloPublished in: SCCC (2017)
Keyphrases
- information security
- intrusion detection
- information assurance
- access control
- security management
- security problems
- security threats
- network security
- statistical databases
- security issues
- security systems
- security requirements
- security measures
- security level
- computer security
- security policies
- functional requirements
- user authentication
- neural network
- blocks world
- security properties
- smart card
- heuristic search
- monte carlo
- search algorithm