作者: Nathalie Foster , Jeremy Jacob
关键词:
摘要: This paper describes a process for the generation and analysis of security protocol requirements. It addresses some problems resulting from inadequacies present development methods. is based on hazard technique which has been developed safety critical systems engineering. provides structured method requirements whilst avoiding being too restrictive.