Induction and Implementation of Security Requirements in Each System Block.
Tai-Hoon KimKouichi SakuraiSun-myung HwangPublished in: MMM (2) (2007)
Keyphrases
- security requirements
- smart card
- security policies
- security analysis
- security properties
- access control
- information security
- security mechanisms
- security concerns
- security model
- mobile commerce
- reference models
- software architecture
- reference model
- security protocols
- artificial intelligence
- security problems
- real time