Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges.
Nan SunChang-Tsun LiHin ChanBa Dung LeMd Zahidul IslamLeo Yu ZhangMd. Rafiqul IslamWarren ArmstrongPublished in: IEEE Access (2022)
Keyphrases
- security requirements
- security concerns
- security problems
- security analysis
- smart card
- security policies
- access control
- information security
- security mechanisms
- security properties
- security model
- mobile commerce
- reference models
- software architecture
- security patterns
- real world
- requirements engineering
- security issues
- intrusion detection
- computer systems
- information technology
- data mining