Adaptive Reasoning in the Presence of Imperfect Security Requirements.
Sara SartoliAkbar Siami NaminPublished in: COMPSAC (2016)
Keyphrases
- security requirements
- security analysis
- meta reasoning
- smart card
- security problems
- security concerns
- security model
- information security
- security policies
- security properties
- access control
- security patterns
- mobile commerce
- software architecture
- covert channel
- security mechanisms
- reference models
- secure electronic
- security protocols
- high volume
- databases
- development lifecycle