As systems become more complex, the potential for security vulnerabilities being introduced increases. If we are to provide assurances about systems we design then we need the means of analysing, managing, and generally making sense of the data that contributes to the design. Unfortunately, despite ongoing research into tools for supporting secure software development, there are few examples of how tools can be used to help build and support design models associated with security and usability. This paper summarises some of our experiences developing and applying CAIRIS: a requirements management tool for usable and secure system design. We describe our motivation for building CAIRIS, summarise how it was built and evaluated, and present ou...
Despite the acknowledged need for systems to be both us- able and secure, we lack guidance on how d...
There is ongoing interest in utilising user experiences associated with security and privacy to bett...
The fact that security was often neglected in the design and construction of computer software has l...
As systems become more complex, the potential for security vulnerabilities being introduced increase...
As systems become more complex, the potential for security vulnerabilities being introduced increase...
Understanding how to better elicit, specify, and manage requirements for secure and usable software ...
Understanding how to better elicit, specify, and manage requirements for secure and usable software ...
Designing usable and secure software is hard with- out tool-support. Given the importance of requir...
Despite existing work on dealing with security and usability concerns during the early stages of des...
Despite existing work on dealing with security and usability concerns during the early stages of des...
Designing usable and secure software is hard without tool-support. Given the importance of requireme...
Abstract—There is ongoing interest in utilising user expe-riences associated with security and priva...
There is ongoing interest in utilising user experiences associated with security and privacy to bett...
Despite the acknowledged need for systems to be both usable and secure, we lack guidance on how deve...
“People are the weakest link in the security chain ” – Bruce Schneier The aim of the thesis is to i...
Despite the acknowledged need for systems to be both us- able and secure, we lack guidance on how d...
There is ongoing interest in utilising user experiences associated with security and privacy to bett...
The fact that security was often neglected in the design and construction of computer software has l...
As systems become more complex, the potential for security vulnerabilities being introduced increase...
As systems become more complex, the potential for security vulnerabilities being introduced increase...
Understanding how to better elicit, specify, and manage requirements for secure and usable software ...
Understanding how to better elicit, specify, and manage requirements for secure and usable software ...
Designing usable and secure software is hard with- out tool-support. Given the importance of requir...
Despite existing work on dealing with security and usability concerns during the early stages of des...
Despite existing work on dealing with security and usability concerns during the early stages of des...
Designing usable and secure software is hard without tool-support. Given the importance of requireme...
Abstract—There is ongoing interest in utilising user expe-riences associated with security and priva...
There is ongoing interest in utilising user experiences associated with security and privacy to bett...
Despite the acknowledged need for systems to be both usable and secure, we lack guidance on how deve...
“People are the weakest link in the security chain ” – Bruce Schneier The aim of the thesis is to i...
Despite the acknowledged need for systems to be both us- able and secure, we lack guidance on how d...
There is ongoing interest in utilising user experiences associated with security and privacy to bett...
The fact that security was often neglected in the design and construction of computer software has l...