Abstract. Access protection is an important requirement for systems, which handle confidential data. This paper describes an approach for the requirements engineering of an access protection using the example of an open system. A major problem of open systems is that many users with different roles access it. Moreover, the open system is connected to the Internet and has ports for connecting hardware like an external storage medium. Therefore, it is easy to steal or misuse confidential data from open systems if access protection is not existent. First, we used Task and Object-Oriented Requirements Engineering (TORE) in order to specify functional requirements on the access protection. For the elicitation of non-functional requirements, we a...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
8 pagesInternational audienceThis paper presents the KAOS2RBAC approach for Security Requirements En...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Pressures are increasing on organisations to take an early and more systematic approach to security....
Needs about security are matters little taken into account when managing requirements engineering , ...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
This paper describes a paradigmatic approach to develop architecture of secure systems by describing...
We introduce vulnerability threats classification and formulate unauthori7al access prevention probl...
Computer security measures, policies and mechanisms generally fail if they are not understood and ac...
A challenging task in security engineering concerns the specification and integration of security wi...
This paper presents some first results of the one-year project "Empirical Secure Software Engineeri...
Abstract. Affecting multiple parts in software systems, security re-quirements often tangle with fun...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
AbstractDefining security requirements is of prime importance for all systems; we usually study the ...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
8 pagesInternational audienceThis paper presents the KAOS2RBAC approach for Security Requirements En...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Pressures are increasing on organisations to take an early and more systematic approach to security....
Needs about security are matters little taken into account when managing requirements engineering , ...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
This paper describes a paradigmatic approach to develop architecture of secure systems by describing...
We introduce vulnerability threats classification and formulate unauthori7al access prevention probl...
Computer security measures, policies and mechanisms generally fail if they are not understood and ac...
A challenging task in security engineering concerns the specification and integration of security wi...
This paper presents some first results of the one-year project "Empirical Secure Software Engineeri...
Abstract. Affecting multiple parts in software systems, security re-quirements often tangle with fun...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
AbstractDefining security requirements is of prime importance for all systems; we usually study the ...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
8 pagesInternational audienceThis paper presents the KAOS2RBAC approach for Security Requirements En...
Although security requirements engineering has recently attracted increasing attention, it has lacke...