Building Security Requirements Using State Transition Diagram at Security Threat Location.
Seong Chae SeoJin Ho YouYoung Dae KimJun Yong ChoiSang Jun LeeByung Ki KimPublished in: CIS (2) (2005)
Keyphrases
- security requirements
- smart card
- security analysis
- information security
- security mechanisms
- security policies
- security concerns
- security model
- access control
- security problems
- software architecture
- mobile commerce
- security properties
- reference models
- secure electronic
- requirements engineering
- security patterns
- operating system