Sign in

Identifying and Implementing Security Patterns for a Dependable Security Case - From Security Patterns to D-Case.

Vaise PatuShuichiro Yamamoto
Published in: CSE (2013)
Keyphrases
  • security patterns
  • security requirements
  • formal model
  • security properties
  • requirements engineering
  • real world
  • artificial intelligence
  • information systems
  • smart card
  • early stage
  • security policies
  • security analysis