Stating Security Requirements with Tolerable Sets.
Dale M. JohnsonF. Javier ThayerPublished in: ACM Trans. Comput. Syst. (1988)
Keyphrases
- security requirements
- smart card
- security analysis
- access control
- security model
- security mechanisms
- security properties
- security problems
- information security
- security policies
- security concerns
- software architecture
- security patterns
- mobile commerce
- requirements engineering
- secure electronic
- open source
- reference models
- distributed systems