CYBER-TRUST end-user requirements

Summary
This report will describe the methodology used in order to extract, categorise and prioritise the end-user requirements, and their subsequent translation into technical requirements. It will be revised on month M14 following the end-user feedback during the design phase.