Agree to disagree: security requirements are different, but mechanisms for security adaptation are not.
Thein Than TunAmel BennaceurPublished in: SEAMS@ICSE (2018)
Keyphrases
- security requirements
- security mechanisms
- security analysis
- information security
- security problems
- access control
- security properties
- security concerns
- smart card
- security model
- security policies
- mobile commerce
- security threats
- secure electronic
- security patterns
- software architecture
- security issues
- security services
- payment systems
- covert channel
- requirements engineering
- security protocols
- intrusion detection