Assessment of risk perception in security requirements composition.
Hanan HibshiTravis D. BreauxStephen B. BroomellPublished in: RE (2015)
Keyphrases
- security requirements
- risk assessment
- information security
- smart card
- security analysis
- access control
- security policies
- security properties
- security model
- security concerns
- security problems
- mobile commerce
- security mechanisms
- software architecture
- risk management
- covert channel
- reference models
- security patterns
- decision making
- network security
- real time
- secure electronic
- timing constraints
- intrusion detection
- open source
- multi agent
- artificial intelligence