We present a set of process patterns that can be used to as a systematic way of analysing the security requirements in a novel domain, taking ubiquitous healthcare as an example.
doi 10.1007/b135497 | full paper : PDF 124K
@inproceedings(SS-SPC-05, author = "Yang Liu and John A. Clark and Susan Stepney", title = "{"Devices are People Too"}: using process patterns to elicit security requirements in novel domains", pages = "31--45", crossref = "SPC-05" ) @proceedings(SPC-05, title = "SPC'05: Security of Pervasive Computing, Boppard, Germany", booktitle = "SPC'05: Security of Pervasive Computing, Boppard, Germany", editor = "D. Hutter and M. Ullmann", series = "LNCS", volume = 3450, publisher = "Springer", year = 2005 )