Towards automating the security compliance value chain.
Smita GhaisasManish MotwaniBalaji BalasubramaniamAnjali GajendragadkarRahul KelkarHarrick M. VinPublished in: ESEC/SIGSOFT FSE (2015)
Keyphrases
- information security
- security problems
- security issues
- security mechanisms
- network security
- statistical databases
- security measures
- security requirements
- security policies
- access control
- intrusion detection
- security systems
- case study
- functional requirements
- key management
- computer security
- security analysis
- security protocols
- cyber security
- security threats