Eliciting security requirements with misuse cases.
Guttorm SindreAndreas L. OpdahlPublished in: Requir. Eng. (2005)
Keyphrases
- security requirements
- security policies
- security analysis
- security concerns
- smart card
- information security
- security model
- access control
- security properties
- security problems
- security mechanisms
- anomaly detection
- reference models
- security patterns
- mobile commerce
- secure electronic
- software architecture
- network security
- development lifecycle
- artificial intelligence
- distributed systems