Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Security Analysis.
Tope OmitolaAbdolbaghi RezazadehMichael J. ButlerPublished in: DEXA Workshops (2019)
Keyphrases
- security analysis
- security requirements
- cyber physical systems
- smart card
- security properties
- security model
- information security
- access control
- security policies
- high security
- mobile commerce
- software architecture
- secure electronic
- security mechanisms
- physical world
- user authentication
- cyber security
- authentication protocol
- public key
- real time
- encryption scheme
- authentication scheme
- cost effective
- open source