Analysing Security Requirements of Information Systems Using Tropos.
Haralambos MouratidisGordon A. MansonAbdullah GaniPaolo GiorginiPublished in: ICEIS (3) (2003)
Keyphrases
- security requirements
- requirements analysis
- information systems
- requirements engineering
- information security
- goal oriented
- agent oriented
- smart card
- security analysis
- security policies
- development process
- security concerns
- access control
- security model
- software architecture
- security mechanisms
- software development
- security properties
- mobile commerce
- information technology
- security patterns
- open source
- cooperative
- covert channel
- grounded theory
- agent technology
- network security
- knowledge management
- multi agent systems
- secure electronic