Assessing the Understandability and Acceptance of Attack-Defense Trees for Modelling Security Requirements.
Giovanna BrocciaMaurice H. ter BeekAlberto Lluch-LafuentePaola SpoletiniAlessio FerrariPublished in: CoRR (2024)
Keyphrases
- software engineering
- security requirements
- software architecture
- security analysis
- defense mechanisms
- information security
- countermeasures
- security policies
- ddos attacks
- security problems
- access control
- smart card
- network security
- software systems
- security concerns
- security properties
- security model
- intrusion detection
- mobile commerce
- security patterns
- reference models
- security mechanisms
- secure electronic
- authentication protocol
- cyber attacks
- information systems
- covert channel
- development lifecycle
- databases
- image encryption
- case study
- timing constraints
- security protocols
- security issues
- multi agent systems
- lightweight