Eliciting Security Requirements in the Commanded Behavior Frame: An Ontology based Approach.
Xiaohong ChenJing LiuPublished in: SEKE (2012)
Keyphrases
- security requirements
- smart card
- security problems
- security analysis
- security model
- security policies
- security mechanisms
- information security
- security concerns
- access control
- security properties
- reference models
- software architecture
- real world
- security patterns
- mobile commerce
- goal oriented
- covert channel
- computer networks
- low cost
- wireless sensor networks
- case study