A Goal-Oriented Approach for Mitigating Security and Continuity Risks.
Jane Cleland-HuangMark DenneGhazy MahjubNilesh PatelPublished in: ISSSE (2006)
Keyphrases
- risk management
- risk analysis
- risk assessment
- security issues
- intrusion detection
- network security
- computer security
- security requirements
- risk factors
- security risks
- decision support system
- real time
- high security
- security mechanisms
- security systems
- security properties
- security vulnerabilities
- information assurance
- rfid tags
- key management
- information security
- wireless networks
- website
- decision making
- data sets