A Tool for Managing Evolving Security Requirements.
Gábor BergmannFabio MassacciFederica PaciThein Than TunDániel VarróYijun YuPublished in: CAiSE Forum (2011)
Keyphrases
- security requirements
- security analysis
- smart card
- security properties
- access control
- security policies
- information security
- security mechanisms
- security model
- security concerns
- security problems
- security patterns
- reference models
- mobile commerce
- covert channel
- information technology
- artificial intelligence
- security protocols
- network security
- formal model
- software architecture
- wireless sensor networks
- real time