Integrating Functional and Security Requirements with Use Case Decomposition.
Joshua J. PauliDianxiang XuPublished in: ICECCS (2006)
Keyphrases
- security requirements
- smart card
- information security
- access control
- security analysis
- security policies
- security problems
- security properties
- security concerns
- security model
- security mechanisms
- software architecture
- mobile commerce
- covert channel
- security patterns
- secure electronic
- reference models
- operating system