Defining Security Requirements Through Misuse Actions.
Eduardo B. FernándezMichael VanHilstMaría M. Larrondo-PetrieShihong HuangPublished in: IFIP Workshop on Advanced Software Engineering (2006)
Keyphrases
- security requirements
- security policies
- smart card
- access control
- security problems
- security properties
- security analysis
- security model
- security concerns
- information security
- software architecture
- security mechanisms
- reference models
- high level
- mobile commerce
- security patterns
- secure electronic
- low cost
- databases
- covert channel