共 50 条
- [33] Security and Privacy Requirements Engineering for Human Centric IoT Systems using eFRIEND and Isabelle [J]. 2017 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2017, : 401 - 406
- [34] Which Security Requirements Engineering Methodology Should I Choose? Towards a Requirements Engineering-based Evaluation Approach [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
- [36] An evaluation methodology for the security of cryptosystems [J]. PRIME: 2008 PHD RESEARCH IN MICROELECTRONICS AND ELECTRONICS, PROCEEDINGS, 2008, : 113 - 115
- [38] Security and privacy of EHR systems - Ethical, social and legal requirements [J]. ADVANCED HEALTH TELEMATICS AND TELEMEDICINE: THE MAGDEBURG EXPERT SUMMIT TEXTBOOK, 2003, 96 : 121 - 127
- [39] Configuring Data Flows in the Internet of Things for Security and Privacy Requirements [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 115 - 130