Transforming Security Requirements into Architecture.
Koen YskoutRiccardo ScandariatoBart De WinWouter JoosenPublished in: ARES (2008)
Keyphrases
- security requirements
- software architecture
- security analysis
- information security
- security properties
- smart card
- security model
- security problems
- security mechanisms
- access control
- security policies
- security concerns
- mobile commerce
- distributed systems
- security patterns
- software systems
- software engineering
- requirements engineering
- real time
- electronic commerce
- low cost