Login / Signup
Barry is not the weakest link: eliciting secure system requirements with personas.
Shamal Faily
Ivan Flechais
Published in:
BCS HCI (2010)
Keyphrases
</>
requirements analysis
lightweight
security analysis
real time
neural network
application specific
database
case study
access control
multi attribute
user requirements
security issues
real time systems
covert channel