Validating Cyber Security Requirements: A Case Study.
Robert K. AbercrombieFrederick T. SheldonAli MiliPublished in: HICSS (2011)
Keyphrases
- security requirements
- security analysis
- information security
- smart card
- access control
- security policies
- security problems
- security model
- software architecture
- security concerns
- security properties
- security mechanisms
- case study
- security patterns
- reference models
- mobile commerce
- information systems
- requirements engineering
- distributed systems
- databases
- covert channel
- secure electronic