Login / Signup
Eliciting confidentiality requirements in practice.
Seda F. Gürses
Jens H. Jahnke
Christina Obry
Adeniyi Onabajo
Thomas Santen
Morgan Price
Published in:
CASCON (2005)
Keyphrases
</>
requirements analysis
artificial intelligence
real time
access control
real world
social networks
multiscale
relational databases
information security
application specific
functional requirements