Eliciting Security Requirements through Misuse Activities.
Fabrício A. BrazEduardo B. FernándezMichael VanHilstPublished in: DEXA Workshops (2008)
Keyphrases
- security requirements
- security policies
- smart card
- access control
- security analysis
- security properties
- information security
- security concerns
- security model
- security problems
- security mechanisms
- security patterns
- reference models
- software architecture
- secure electronic
- mobile commerce
- covert channel
- information systems
- intrusion detection system
- software engineering
- case study
- data mining