A methodology for security assurance-driven system development.
José Luis VivasIsaac AgudoJavier LópezPublished in: Requir. Eng. (2011)
Keyphrases
- information security
- soft systems
- information processing
- data driven
- intrusion detection
- security requirements
- access control
- security level
- security systems
- decision making
- computer security
- design principles
- security policies
- data sets
- key management
- security mechanisms
- virtual organization
- development environment
- information technology
- information systems
- knowledge based systems
- computer systems
- expert systems