Login / Signup
Security Requirements Elicitation via Weaving Scenarios Based on Security Evaluation Criteria.
Hiroya Itoga
Atsushi Ohnishi
Published in:
QSIC (2007)
Keyphrases
</>
evaluation criteria
information security
requirements elicitation
access control
security requirements
network security
pattern recognition
databases
real world
data mining
information retrieval
business processes
security policies