Back to Results
First PageMeta Content
National security / Public safety / Data security / Anti-pattern / Application security / Information security / Problem frames approach / Software security assurance / Security / Computer security / Crime prevention


Information Security Antipatterns in Software Requirements Engineering Miroslav Kis, Ph.D., CISSP, Member IEEE Abstract Requirements engineering is one of the key activities in
Add to Reading List

Document Date: 2004-02-16 17:18:41


Open Document

File Size: 132,09 KB

Share Result on Facebook

Company

Information Security Bank of Montreal / Addison-Wesley Pub Comp. / Motorola / Bank of Montreal / Motorola Internet / Security Association Management / /

Country

France / /

/

Event

Product Issues / /

Facility

University of Belgrade / /

IndustryTerm

adequate security solution / software development process / local area network / application server / software security methodologies / software development processes / architectural solution / security solution / typical solution / enterprise applications / software developers / e - business / biometrics authentication systems / software development / software development methodologies / everyday software development practice / speech recognition algorithm / typical security solution / internet applications / perimeter solution / enterprise software application / software architects / software applications / internet era / secure computer systems / Internet Workstation Firewall Server / e - commerce / software development theory / speech recognition device / data / pre-internet time / intranet infrastructure / cases technology / software architectures / antipattern solution / software architecture / encryption algorithm / security product / secure software / security solutions / /

NaturalFeature

Strait of Messina / /

Organization

U. S. Air Force Electronic Systems Division / University of Belgrade / IEEE Computer Society / /

Person

Eamonn Guiney / Vivek Khindria / Marla Nystrom-Smith / Michael Jackson / John Wordsworth / Milena Jelich / Martin Green / Alejandra Garrido / Addison Wesley / Dieter Gollmann / Carl von Clausewitz / Daryl Kulak / Daniel Jones / Erin Lavkulich / Miroslav Kis / Charles P. Pfleeger / John Wiley / /

Position

architect / text editor / Acknowledgements The author / software architect / Private Network protocol / guard network connections The solution / manager of the Strategy and Technology group / engineer / senior advisor / /

Product

beliefs While technology / belief / perimeter protection model / beliefs / beliefs In essence / /

Technology

expert system / 2.5 Faulty beliefs While technology / LAN / speech recognition / speech recognition algorithm / encryption algorithm / cases technology / Virtual Private Network protocol / encryption / Ethernet / Vanguard routers / firewall / /

URL

http /

SocialTag