Resumen
This work can be applied with the Requirements Engineering Process to elicit the security requirements for an information system?s development.
Palabras claves