Identifying Security Requirements Hybrid Technique.
Vandana GandotraArchana SinghalPunam BediPublished in: ICSEA (2009)
Keyphrases
- security requirements
- security analysis
- smart card
- security properties
- security policies
- information security
- security model
- security concerns
- security mechanisms
- access control
- security problems
- software architecture
- mobile commerce
- reference models
- security patterns
- secure electronic
- real time
- development lifecycle
- security protocols
- timing constraints
- operating system
- distributed systems