Login / Signup
Adaptive Reasoning in the Presence of Imperfect Security Requirements.
Sara Sartoli
Akbar Siami Namin
Published in:
COMPSAC (2016)
Keyphrases
</>
security requirements
security analysis
meta reasoning
smart card
security problems
security concerns
security model
information security
security policies
security properties
access control
security patterns
mobile commerce
software architecture
covert channel
security mechanisms
reference models
secure electronic
security protocols
high volume
databases
development lifecycle