Identifying the implied: Findings from three differentiated replications on the use of security requirements templates.
Maria RiazJason Tyler KingJohn SlankasLaurie A. WilliamsFabio MassacciChristian Quesada-LópezMarcelo JenkinsPublished in: Empir. Softw. Eng. (2017)
Keyphrases
- security requirements
- security analysis
- information security
- smart card
- security model
- access control
- security policies
- security properties
- software architecture
- security mechanisms
- security problems
- case study
- reference models
- covert channel
- security concerns
- secure electronic
- security protocols
- requirements engineering