|
Volumn 7195 LNCS, Issue , 2012, Pages 132-139
|
Aligning mal-activity diagrams and security risk management for security requirements definitions
|
Author keywords
Information system security risk management; Mal activity diagrams; Requirement engineering; Risk management
|
Indexed keywords
CONCEPTUAL FRAMEWORKS;
DESIGN STAGE;
DOMAIN MODEL;
INFORMATION SYSTEM SECURITY;
INFORMATION SYSTEMS SECURITY;
LANGUAGE CONSTRUCTS;
MAL-ACTIVITY DIAGRAMS;
MODEL SECURITY;
MODELLING LANGUAGE;
REQUIREMENT ENGINEERING;
SECURITY ENGINEERING;
SECURITY REQUIREMENTS;
SYSTEM DEVELOPMENT;
SYSTEM DEVELOPMENT PROCESS;
SYSTEM REQUIREMENTS;
COMPUTER SOFTWARE SELECTION AND EVALUATION;
DESIGN;
INFORMATION SYSTEMS;
REQUIREMENTS ENGINEERING;
RISK MANAGEMENT;
SYSTEMS ANALYSIS;
INFORMATION MANAGEMENT;
|
EID: 84858311224
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/978-3-642-28714-5_11 Document Type: Conference Paper |
Times cited : (16)
|
References (6)
|