We present a set of process patterns that can be used to as a systematic way of analysing the security requirements in a novel domain, taking ubiquitous healthcare as an example.
doi 10.1007/b135497 | full paper : PDF 124K
@inproceedings(SS-SPC-05,
author = "Yang Liu and John A. Clark and Susan Stepney",
title = "{"Devices are People Too"}: using process patterns to
elicit security requirements in novel domains",
pages = "31--45",
crossref = "SPC-05"
)
@proceedings(SPC-05,
title = "SPC'05: Security of Pervasive Computing, Boppard, Germany",
booktitle = "SPC'05: Security of Pervasive Computing, Boppard, Germany",
editor = "D. Hutter and M. Ullmann",
series = "LNCS",
volume = 3450,
publisher = "Springer",
year = 2005
)