共 50 条
- [41] Analysis of Key Critical Requirements for Enhancing Security of Web Applications 2015 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, AND SYSTEMS (ICCCS), 2015, : 241 - 245
- [43] A Security Requirements Library for the Development of Internet of Things (IoT) Applications REQUIREMENTS ENGINEERING FOR INTERNET OF THINGS, 2018, 809 : 87 - 96
- [45] Adapting Compliance of Security Requirements in Multi-Tenant Applications 2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 122 - 129
- [46] A Study of Security Requirements in Wireless Sensor Networks for Smart Home Healthcare Systems PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA'18), 2018,
- [47] Security Policy and Requirements from the Healthcare Insurance Portability and Accountability ACT of 1996 TOWARD AN ELECTRONIC PATIENT RECORD '97 - CONFERENCE AND EXPOSITION, PROCEEDINGS, VOLS 1-3, 1997, : A136 - A136
- [48] Security Requirements for the Medical Information Used by U-Healthcare Medical Equipment INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 169 - 180
- [49] Understanding Data Flow and Security Requirements in Wireless Body Area Networks for Healthcare 2015 17TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM), 2015, : 621 - 626
- [50] CincoSecurity: A Reusable Security Module Based on Fine Grained Roles and Security Profiles for Java']Java EE Applications PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2011), 2011, : 118 - 123