Login / Signup
Security Requirements Prioritization Based on Threat Modeling and Valuation Graph.
Keunyoung Park
Sang Guun Yoo
Juho Kim
Published in:
ICHIT (2) (2011)
Keyphrases
</>
security requirements
smart card
security analysis
access control
information security
security concerns
software architecture
security mechanisms
security properties
security policies
security model
mobile commerce
security problems
databases
security patterns