Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources.
Christian SchmittPeter LiggesmeyerPublished in: Complex Syst. Informatics Model. Q. (2015)
Keyphrases
- security requirements
- requirements elicitation
- requirements engineering
- security problems
- security analysis
- information security
- software engineering
- security properties
- security concerns
- security mechanisms
- smart card
- security policies
- security model
- access control
- software architecture
- mobile commerce
- security patterns
- databases
- security protocols
- requirements analysis
- secure electronic
- high security
- security issues
- data sources
- decision making
- development lifecycle
- machine learning