Requirements-Driven Runtime Reconfiguration for Security.
Koen YskoutOlivier-Nathanael Ben DavidRiccardo ScandariatoBenoit BaudryPublished in: EternalS@FET (2011)
Keyphrases
- functional requirements
- information security
- data driven
- information assurance
- security problems
- security policies
- computer security
- holonic manufacturing systems
- security threats
- security requirements
- intrusion detection
- requirements engineering
- security analysis
- software systems
- security measures
- security vulnerabilities
- security mechanisms
- security issues
- cyber security
- security level
- security properties
- manufacturing systems
- data sets