Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standard.
Roman WirtzMaritta HeiselAngela BorchertRene MeisAida OmerovicKetil StølenPublished in: ENASE (Selected Papers) (2018)
Keyphrases
- security requirements
- security analysis
- smart card
- access control
- security properties
- security policies
- security concerns
- security mechanisms
- mobile commerce
- information security
- security patterns
- software architecture
- security model
- security problems
- software engineering
- data mining
- covert channel
- security protocols
- case study
- artificial intelligence