This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
Eliciting and analyzing requirements within knowledge systems, which fundamentally differ so far from technology supported systems represent particular challenges. African rural c...
Heike Winschiers-Theophilus, Nicola J. Bidwell, Sh...
During the development of system requirements, software system specifications are often inconsistent. Inconsistencies may arise for different reasons, for example, when multiple...
Odinaldo Rodrigues, Artur S. d'Avila Garcez, Aless...
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...