Towards the Weaving of the Characteristics of Good Security Requirements.
Sravani Teja BulusuRomain LabordeAhmad Samer WazanFrançois BarrèreAbdelmalek BenzekriPublished in: CRiSIS (2016)
Keyphrases
- security requirements
- security analysis
- information security
- smart card
- security policies
- security properties
- security concerns
- software architecture
- security mechanisms
- security model
- security problems
- security patterns
- information systems
- mobile commerce
- access control
- artificial intelligence
- reference models
- covert channel