Building an automotive security assurance case using systematic security evaluations.
Madeline CheahSiraj A. ShaikhJeremy W. BryansPaul WoodersonPublished in: Comput. Secur. (2018)
Keyphrases
- information security
- intrusion detection
- security policies
- network security
- access control
- statistical databases
- security issues
- security requirements
- database
- high security
- security vulnerabilities
- security problems
- security level
- security systems
- computer security
- database systems
- data sets
- functional requirements
- human operators
- countermeasures
- user authentication
- smart card
- security threats
- security management
- information systems