Login / Signup
Testing Security Requirements with Non-experts: Approaches and Empirical Investigations.
Bernhard Peischl
Michael Felderer
Armin Beer
Published in:
QRS (2016)
Keyphrases
</>
security requirements
smart card
security analysis
security model
security properties
databases
access control
security mechanisms
security problems
security concerns
machine learning
artificial intelligence
computer systems
security policies