Incorporating Security Requirements Into the Software Development Process.
Theodoros BalopoulosStelios DritsasLazaros GymnopoulosMaria KarydaSpyros KokolakisStefanos GritzalisPublished in: ECIW (2005)
Keyphrases
- security requirements
- smart card
- security analysis
- information security
- security properties
- access control
- security model
- security problems
- security mechanisms
- security concerns
- software architecture
- reference models
- mobile commerce
- security policies
- security patterns
- secure electronic
- covert channel
- intrusion detection
- computer systems
- artificial intelligence