Characterizations and boundaries of security requirements patterns.
Rocky SlavinHui ShenJianwei NiuPublished in: RePa (2012)
Keyphrases
- security requirements
- security patterns
- smart card
- security analysis
- information security
- security policies
- access control
- security properties
- security concerns
- security mechanisms
- security model
- reference models
- security problems
- software architecture
- mobile commerce
- secure electronic
- requirements engineering
- timing constraints
- formal model
- knowledge management
- data model
- covert channel
- development lifecycle
- real time