Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements.
Duaa AlkubaisyKarl CoxHaralambos MouratidisPublished in: RCIS (2019)
Keyphrases
- security requirements
- security concerns
- security properties
- security mechanisms
- smart card
- information security
- security policies
- security analysis
- security problems
- security model
- software architecture
- timing constraints
- access control
- security issues
- reference models
- conflict resolution
- privacy preserving
- development lifecycle
- mobile commerce
- secure electronic
- data security
- personal data
- data privacy
- privacy preserving data mining
- privacy protection
- information systems
- authentication protocol
- security protocols
- covert channel
- intrusion detection