Mining Security Requirements from Common Vulnerabilities and Exposures for Agile Projects.
Wentao WangArushi GuptaNan NiuPublished in: QuaRAP@RE (2018)
Keyphrases
- security requirements
- information security
- security patterns
- security mechanisms
- software development
- project management
- requirements engineering
- smart card
- security properties
- security concerns
- security analysis
- security problems
- security policies
- security model
- reference models
- software architecture
- security issues
- case study
- secure electronic
- access control
- information systems
- mobile commerce
- knowledge discovery
- software projects
- network security
- software engineering
- security threats
- covert channel
- software development process
- data mining
- databases