Pattern-Based Security Requirements Derivation from Secure Tropos Models.
Atilio RrenjaRaimundas MatuleviciusPublished in: PoEM (2015)
Keyphrases
- security requirements
- reference models
- security properties
- security analysis
- smart card
- covert channel
- access control
- security policies
- security mechanisms
- security patterns
- security concerns
- information security
- artificial intelligence
- security model
- software architecture
- databases
- goal oriented
- knowledge management