表10:SFR的摘要....................................................................................................................................................................................................................................................................................................................... 16表11:加密操作........................................................................................................................................................................................................................................... ................................................................................................................................................................................................................................................................................................................................................................................................................. ................................................................................... 37 Table 17: Security Requirements Mapping ................................................................................... 38 Table 18: Suitability of SFRs ......................................................................................................... 40 Table 19: Dependency Rationale .......................................................................................................................................................................... 41
主要关键词