|
Volumn 3225, Issue , 2004, Pages 416-427
|
Effective security requirements analysis: HAZOP and use cases
|
Author keywords
[No Author keywords available]
|
Indexed keywords
SECURITY OF DATA;
FUNCTIONAL REQUIREMENT;
HAZOP;
NON-FUNCTIONAL REQUIREMENTS;
REQUIREMENT ANALYSIS;
REQUIREMENTS ANALYSIS;
SAFETY AND SECURITIES;
SECURITY ANALYSIS;
SECURITY REQUIREMENTS;
REQUIREMENTS ENGINEERING;
|
EID: 35048899397
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/978-3-540-30144-8_35 Document Type: Article |
Times cited : (38)
|
References (14)
|