Modeling and Utilizing Security Knowledge for Eliciting Security Requirements.
Tatsuya AbeShinpei HayashiMotoshi SaekiPublished in: ER Workshops (2015)
Keyphrases
- security requirements
- information security
- security properties
- security analysis
- security mechanisms
- security problems
- access control
- security policies
- security concerns
- security model
- smart card
- security patterns
- software architecture
- security protocols
- knowledge management
- mobile commerce
- knowledge discovery
- reference models
- secure electronic
- open source
- requirements engineering
- goal oriented
- network security
- diffie hellman
- formal model
- operating system
- covert channel
- databases