Login / Signup
"Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example.
Yang Liu
John A. Clark
Susan Stepney
Published in:
SPC (2005)
Keyphrases
</>
security requirements
security analysis
mobile devices
requirements engineering
security mechanisms
reference models
software engineering
data mining techniques
process model
security model
development lifecycle