Security Requirements Embedded in MS Programs in Information Sciences and Technologies.
Jai W. KangQi YuEdward P. HoldenTae H. OhPublished in: SIGITE (2016)
Keyphrases
- security requirements
- information sciences
- smart card
- security analysis
- information security
- access control
- software architecture
- security mechanisms
- security properties
- artificial intelligence
- security policies
- state university
- high performance computing
- embedded systems
- cognitive computing
- cognitive informatics
- information systems
- parallel computing
- computing technologies
- case study