Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme.
Takeshi TakahashiJoona KannistoJarmo HarjuAkira KanaokaYuuki TakanoShin'ichiro MatsuoPublished in: SERVICES (2014)
Keyphrases
- security requirements
- security analysis
- security model
- smart card
- development lifecycle
- access control
- security properties
- security policies
- information security
- security concerns
- security mechanisms
- security problems
- mobile commerce
- covert channel
- software architecture
- high security
- reference models
- security patterns
- secure electronic
- authentication scheme
- object oriented
- diffie hellman
- hash functions
- computer systems