Enhanced Misuse Cases for Prioritization of Security Requirements.
Sang Guun YooHugo Pérez VacaJuho KimPublished in: ICIME (2017)
Keyphrases
- security requirements
- security policies
- security analysis
- smart card
- access control
- security concerns
- information security
- security properties
- software architecture
- security mechanisms
- mobile commerce
- security problems
- security model
- reference models
- security patterns
- requirements engineering
- high level
- network security
- data warehouse
- knowledge discovery