Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements.
Charles B. HaleyRobin C. LaneyJonathan D. MoffettBashar NuseibehPublished in: iTrust (2004)
Keyphrases
- security requirements
- security analysis
- smart card
- security policies
- information security
- security problems
- access control
- security concerns
- security mechanisms
- security model
- security properties
- software architecture
- reference models
- security patterns
- requirements engineering
- development lifecycle
- mobile commerce
- data mining
- secure electronic
- security services
- software development
- distributed systems
- sensor networks
- multi agent
- artificial intelligence