Logic-based methodology to help security architects in eliciting high-level network security requirements.
Romain LabordeSravani Teja BulusuAhmad Samer WazanFrançois BarrèreAbdelmalek BenzekriPublished in: SAC (2019)
Keyphrases
- security requirements
- high level
- security properties
- security problems
- security analysis
- information security
- security concerns
- security policies
- access control
- smart card
- security model
- security mechanisms
- software architecture
- computer networks
- security threats
- security patterns
- network traffic
- peer to peer
- information systems
- mobile commerce
- security issues
- secure electronic
- formal model
- wireless sensor networks
- mobile devices
- artificial intelligence