A Methodology for Mining Security Tactics from Security Patterns.
Jungwoo RyooPhillip A. LaplanteRick KazmanPublished in: HICSS (2010)
Keyphrases
- security patterns
- formal model
- security requirements
- security properties
- early stage
- data mining
- requirements engineering
- security policies
- security analysis
- security mechanisms
- information security
- software development process
- knowledge discovery
- smart card
- access control
- software design
- data mining techniques
- security protocols
- software engineering