Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges.
Nan SunChang-Tsun LiHin ChanBa Dung LeM. D. Zahidul IslamLeo Yu ZhangM. D. Rafiqul IslamWarren ArmstrongPublished in: CoRR (2022)
Keyphrases
- security requirements
- security concerns
- security problems
- smart card
- information security
- security analysis
- access control
- security policies
- security properties
- security mechanisms
- security model
- software architecture
- mobile commerce
- reference models
- real world
- security patterns
- covert channel
- development lifecycle
- secure electronic
- security protocols
- requirements engineering
- object oriented
- network security