Tracing security requirements in industrial control systems using graph databases.
Awais TanveerChandan SharmaRoopak SinhaMatthew M. Y. KuoPublished in: Softw. Syst. Model. (2023)
Keyphrases
- security requirements
- graph databases
- smart card
- information security
- security analysis
- graph mining
- access control
- security policies
- software architecture
- security mechanisms
- application domains
- structured data
- graph model
- query language
- index structure
- protein structure
- regular expressions
- xml databases
- mining algorithm
- similarity search
- greedy algorithm
- database
- quasi cliques
- pattern mining
- real life