A Model Driven Approach for Generating Code from Security Requirements.
Óscar Sánchez RamónFernando MolinaJesús García MolinaJosé Ambrosio Toval ÁlvarezPublished in: WOSIS (2009)
Keyphrases
- security requirements
- smart card
- security analysis
- security properties
- information security
- security policies
- software architecture
- security concerns
- access control
- security problems
- security model
- security mechanisms
- covert channel
- reference models
- secure electronic
- artificial intelligence
- development lifecycle
- requirements engineering
- unsupervised learning
- source code
- wireless sensor networks
- data model
- databases