The Scheme of Security Requirement Acquisition Based on Knowledge Graph.
Yu ZhangXiaohong LiPublished in: TASE (2020)
Keyphrases
- acquisition process
- domain knowledge
- knowledge base
- expert systems
- knowledge acquisition
- data acquisition
- graph model
- domain experts
- structured data
- access control
- social network analysis
- information systems
- information security
- graph matching
- graph structure
- knowledge representation
- bayesian networks
- key distribution
- authentication scheme
- high security
- protection scheme
- electronic voting