Towards Eliciting and Analyzing Security Requirements Using Ontologies through Use Case Scenarios (Work-in-Progress).
Omar OchoaJessica SteinmannYevgeniy LischukPublished in: ICSSA (2018)
Keyphrases
- open source
- security requirements
- smart card
- security analysis
- access control
- security model
- information security
- software architecture
- security policies
- security problems
- security mechanisms
- security properties
- case study
- requirements analysis
- security patterns
- security concerns
- real world
- mobile commerce
- reference models
- ontology mapping
- timing constraints
- artificial intelligence