Automatic mapping of cyber security requirements to support network slicing in software-defined networks.
Marco EhrlichLukasz WisniewskiHenning TrsekDaniel MahrenholzJürgen JasperneitePublished in: ETFA (2017)
Keyphrases
- security requirements
- network structure
- complex networks
- software architecture
- network topologies
- development lifecycle
- computer networks
- security analysis
- software development
- smart card
- community structure
- network technologies
- security problems
- security mechanisms
- access control
- security model
- communication networks
- scale free
- computer systems
- social networks
- information systems
- security policies
- requirements engineering
- software systems
- artificial intelligence
- mobile commerce
- source code
- security properties
- mobile devices
- network traffic
- security patterns
- information security