Although security requirements engineering has recently attracted increasing attention, it has lacked a context in which to operate. A number of papers have described how security requirements may be violated, but apart from a few hints in the general literature, none have described satisfactorily what security requirements are. This paper proposes a framework of core security requirements artefacts, which unifies the concepts of the two disciplines of requirements engineering and security engineering. From requirements engineering it takes the concept of functional goals, which are operationalised into functional requirements, with appropriate constraints. From security engineering it takes the concept of assets, together with threats of h...
International audienceSince many decades, requirements engineering domain has seen significant enhan...
Security is often neglected during requirements elicitation, which leads to tacked-on designs, vulne...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Security has become a primary and prevalent concern for software systems. The past decade has witnes...
Needs about security are matters little taken into account when managing requirements engineering , ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
There has been a growing concern on the importance of security with the rise of phenomena, such as e...
Abstract. Various security requirements sources need to be incorporated when developing security req...
Everyone agrees that security is a problem, ranging from Microsoft to the banks that have been rece...
Security Requirements Engineering is one of the most important parts of the software development lif...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...
International audienceConsidering the multitude of security requirements engineering methodologies a...
International audienceSince many decades, requirements engineering domain has seen significant enhan...
Security is often neglected during requirements elicitation, which leads to tacked-on designs, vulne...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Security has become a primary and prevalent concern for software systems. The past decade has witnes...
Needs about security are matters little taken into account when managing requirements engineering , ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
There has been a growing concern on the importance of security with the rise of phenomena, such as e...
Abstract. Various security requirements sources need to be incorporated when developing security req...
Everyone agrees that security is a problem, ranging from Microsoft to the banks that have been rece...
Security Requirements Engineering is one of the most important parts of the software development lif...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...
International audienceConsidering the multitude of security requirements engineering methodologies a...
International audienceSince many decades, requirements engineering domain has seen significant enhan...
Security is often neglected during requirements elicitation, which leads to tacked-on designs, vulne...
The elaboration of requirements is a crucial step in the development of software-intensive security-...