Applying a Security Requirements Engineering Process.
Daniel MelladoEduardo Fernández-MedinaMario PiattiniPublished in: ESORICS (2006)
Keyphrases
- requirements engineering process
- information security
- life cycle
- requirements engineering
- security issues
- computer security
- security threats
- network security
- access control
- security management
- security model
- security vulnerabilities
- smart card
- intrusion detection
- statistical databases
- database
- key management
- user authentication
- information systems