Keyphrases
Secure Tropos
100%
Requirements Engineering
41%
Security Requirements Engineering
37%
Cloud Computing
34%
SecTro
28%
Security Requirements
28%
Software System
25%
Tropos Methodology
22%
Security Analysis
21%
Security Constraints
19%
Cloud System
19%
Security Goals
18%
Software Product Lines
16%
Cloud Computing Environment
16%
Requirements Modeling Language
16%
Automated Modeling
16%
Secure Business Processes
16%
Business Process Design
16%
Security Privacy
16%
Secure Cloud Computing
16%
Automated Analysis
16%
Security Requirements Modeling
16%
Security Issues
16%
Security Concept
14%
Modeling Language
14%
Privacy Concerns
11%
Illustrative Examples
11%
Design Patterns
9%
Cloud-based
8%
Automated Security Analysis
8%
Cloud Vulnerabilities
8%
Manual Task
8%
Organizational Security
8%
Tropos Goal Model
8%
Usage Example
8%
Security Choice
8%
Process Transformation
8%
BPMN Process Models
8%
Office System
8%
Cloud Security Requirements
8%
Computing Concepts
8%
Transformation Approach
8%
Property Concepts
8%
Transformation Process
8%
Concept Relationship
8%
Engineering Perspective
8%
Cloud Model
8%
Aegean
8%
Semi-automated
8%
Business Process
8%
Cloud Modeling Languages
8%
Mitigation Strategies
8%
Security Engineering
8%
Main Concepts
7%
Security-aware
7%
Goal-oriented
6%
Engineering Approach
6%
Technical Dimension
5%
Cloud Environment
5%
Unique Characteristics
5%
Engineering Technique
5%
Security Threats
5%
System Development Process
5%
Computer Science
Security Requirements
73%
Requirement Engineering
64%
Cloud Computing
42%
Tropos Methodology
34%
Software Systems
33%
Development Process
26%
modeling language
22%
Software Product Line
16%
Security Concept
16%
Business Process
16%
Security and Privacy
16%
Information Systems
16%
Process Model
11%
cloud system
11%
Design Pattern
10%
System Development
9%
Case Study
9%
Elicitation
9%
Security Analysis
7%
Related Concept
7%
Security Engineering
7%
Cloud Environment
6%
Security Objective
6%
Development Stage
6%
Process Transformation
5%
Functional Requirement
5%
Organizational Security
5%
Business Process Model and Notation
5%
Cloud Vulnerability
5%
Cloud Security
5%
Mitigation Strategy
5%
Critical Aspect
5%
Transformation Process
5%
Technical Dimension
5%