Introducing Abuse Frames for Analysing Security Requirements.
Luncheng LinBashar NuseibehDarrel C. InceMichael JacksonJonathan D. MoffettPublished in: RE (2003)
Keyphrases
- security requirements
- security analysis
- smart card
- security properties
- information security
- security problems
- access control
- security policies
- security model
- security concerns
- security mechanisms
- mobile commerce
- software architecture
- security patterns
- covert channel
- requirements engineering
- reference models
- data mining
- security protocols
- security issues
- formal model