Using templates to elicit implied security requirements from functional requirements - a controlled experiment.
Maria RiazJohn SlankasJason Tyler KingLaurie A. WilliamsPublished in: ESEM (2014)
Keyphrases
- security requirements
- functional requirements
- software architecture
- security analysis
- smart card
- software systems
- security properties
- software design
- development process
- information security
- security policies
- security mechanisms
- access control
- covert channel
- quality attributes
- secure electronic
- distributed systems
- design patterns
- software development
- software engineering
- security patterns
- real world
- cooperative
- data mining