Login / Signup
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec.
Siv Hilde Houmb
Shareeful Islam
Eric Knauss
Jan Jürjens
Kurt Schneider
Published in:
Requir. Eng. (2010)
Keyphrases
</>
data warehouse
security requirements
databases
software architecture
case study
smart card
security properties
access control
information security
formal methods
security mechanisms
mobile commerce
security problems