Modeling security and privacy requirements: A use case-driven approach
Context: Modern internet-based services, ranging from food-delivery to home-caring, leverage the availability of multiple programmable devices to provide handy services tailored to end-user needs. These services are delivered through an ecosystem of device-specific software components and interfaces...
Saved in:
Main Authors: | MAI, Phu Xuan, GOKNIL, Arda, SHAR, Lwin Khin, PASTORE, Fabrizio, BRIAND, Lionel, SHAAME, Shaban |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4893 https://ink.library.smu.edu.sg/context/sis_research/article/5896/viewcontent/Modeling___PV.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
by: THOME, Julian, et al.
Published: (2015) -
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving
by: THOME, Julian, et al.
Published: (2018) -
COVID-19 one year on: Security and privacy review of contact tracing mobile apps
by: ANG, Wei Yang, et al.
Published: (2021) -
Security slicing for auditing common injection vulnerabilities
by: THOME, Julian, et al.
Published: (2017) -
Search-driven string constraint solving for vulnerability detection
by: THOME, Julian, et al.
Published: (2017)