Amanote Research

Amanote Research

    RegisterSign In

Arguing Satisfaction of Security Requirements

doi 10.4018/978-1-59904-147-6.ch002
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2007

Authors
C. B. HaleyR. LaneyJ. D. MoffettB. Nuseibeh
Publisher

IGI Global


Related search

Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

Complex Systems Informatics and Modeling Quarterly
2015English

Security and Reliability Requirements for Advanced Security Event Management

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Arguing a Fortiori

Modern Law Review
Law
2017English

Analysis of Security Requirements of Futuristic Mobile Applications

International Journal of Information Sciences and Techniques
2016English

Requirements and Specifications for Adaptive Security

2018English

Job Security, Satisfaction Influence Work Commitment

Newspaper Research Journal
Communication
2012English

Preliminary Security Requirements for SecureCore Hardware

2006English

Security Requirements Elicitation From Airline Turnaround Processes

Wirtschaftsinformatik
Information Systems
2018English

Holistic Security Requirements Analysis: An Attacker's Perspective

2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy