Holistic security requirements analysis: An attacker's perspective.
Tong LiElda PajaJohn MylopoulosJennifer HorkoffKristian BeckersPublished in: RE (2015)
Keyphrases
- requirements analysis
- goal oriented
- development process
- defense mechanisms
- requirements elicitation
- security policies
- access control
- information security
- network security
- security requirements
- security issues
- knowledge intensive
- requirements engineering
- grounded theory
- intrusion detection
- data mining
- real world
- information systems