Argumentation-based security requirements elicitation: The next round.
Dan IonitaJan-Willem BulleeRoel J. WieringaPublished in: ESPRE (2014)
Keyphrases
- requirements elicitation
- software engineering
- requirements engineering
- intrusion detection
- access control
- security requirements
- information security
- development process
- requirements analysis
- security policies
- statistical databases
- security issues
- databases
- artificial intelligence
- information systems
- network security