Extracting security requirements from relevant laws and regulations.
Fatemeh Zarrabi JorshariHaralambos MouratidisShareeful IslamPublished in: RCIS (2012)
Keyphrases
- security requirements
- smart card
- security analysis
- security concerns
- security policies
- security problems
- security properties
- information security
- security model
- access control
- security mechanisms
- reference models
- mobile commerce
- security patterns
- secure electronic
- requirements engineering
- covert channel
- real world
- network security
- data processing
- wireless sensor networks
- multi agent systems
- case study