From Risk Analysis to Security Requirements.
Mariana GerberRossouw von SolmsPublished in: Comput. Secur. (2001)
Keyphrases
- risk analysis
- security requirements
- information security
- risk assessment
- security analysis
- smart card
- security properties
- information systems
- security mechanisms
- security issues
- risk management
- security policies
- network security
- critical infrastructure
- intrusion detection
- access control
- security patterns
- software architecture
- decision making
- secure electronic
- fuzzy numbers
- data mining
- expert systems
- artificial intelligence