Comparing risk identification techniques for safety and security requirements.
Christian RaspotnigAndreas L. OpdahlPublished in: J. Syst. Softw. (2013)
Keyphrases
- security requirements
- smart card
- security analysis
- security problems
- access control
- security properties
- information security
- security policies
- security model
- software architecture
- security concerns
- reference models
- security mechanisms
- mobile commerce
- risk management
- security patterns
- artificial intelligence
- decision making
- real time
- covert channel
- secure electronic
- intrusion detection
- information systems