|
Volumn 3, Issue 1, 2004, Pages 61-75
|
Specifying reusable security requirements
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER CRIME;
COMPUTER HARDWARE;
COMPUTER SYSTEM FIREWALLS;
COMPUTER VIRUSES;
CYBERNETICS;
DATA ACQUISITION;
DATA PRIVACY;
HIERARCHICAL SYSTEMS;
IDENTIFICATION (CONTROL SYSTEMS);
PARAMETER ESTIMATION;
PERSONNEL;
PUBLIC POLICY;
QUALITY ASSURANCE;
RISK ASSESSMENT;
SECURITY OF DATA;
REUSABLE TEMPLATES;
SECURITY MECHANISM;
SECURITY POLICY;
SECURITY RISKS;
SOFTWARE ENGINEERING;
|
EID: 2942753973
PISSN: 16601769
EISSN: None
Source Type: Journal
DOI: 10.5381/jot.2004.3.1.c6 Document Type: Review |
Times cited : (177)
|
References (13)
|