Using trust assumptions with security requirements.
Charles B. HaleyRobin C. LaneyJonathan D. MoffettBashar NuseibehPublished in: Requir. Eng. (2006)
Keyphrases
- security requirements
- security analysis
- security mechanisms
- smart card
- information security
- access control
- security policies
- security model
- security concerns
- security properties
- software architecture
- security problems
- mobile commerce
- security patterns
- security services
- reference models
- requirements engineering
- secure electronic
- privacy concerns
- security protocols
- timing constraints
- data processing
- association rules
- multi agent
- covert channel
- data mining