Towards usable cyber security requirements.
Jose Romero-MarionaHadar ZivDebra J. RichardsonDennis BystritskyPublished in: CSIIRW (2009)
Keyphrases
- security requirements
- smart card
- security analysis
- security properties
- security concerns
- security model
- security policies
- access control
- security problems
- information security
- security patterns
- cyber security
- software architecture
- reference models
- security mechanisms
- mobile commerce
- network security
- intrusion detection
- development lifecycle
- data mining
- secure electronic
- data warehouse
- artificial intelligence