Sign in

A Risk-Based Approach to Formalise Information Security Requirements for Software Development.

Lynn FutcherRossouw von Solms
Published in: World Conference on Information Security Education (2009)
Keyphrases
  • security requirements
  • software development
  • access control
  • case study
  • database systems
  • computer systems
  • software architecture
  • risk management
  • security concerns