This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on assets in the system. These goals are used to derive security requirements in the form of constraints. The system context is described using a problem-centered notation, then this context is validated against the security requirements through construction of a satisfaction argument. The satisfaction argument is in two parts: a formal argument that the system can meet its security requirements, and a structured informal argument supporting the assumptions expressed in the formal argument. T...
Context & motivation: More and more software projects today are security-related in one way or the o...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
In this work we introduce the principle of comprehensible security, which demands that the security ...
This paper presents a framework for security requirements elicitation and analysis. The framework is...
This chapter presents a process for security requirements elicitation and analysis, based around th...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Context: Security considerations are typically incorporated in the later stages of development as an...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
AbstractSecurity is often an afterthought during software development. Realizing security early, esp...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
Context & motivation: More and more software projects today are security-related in one way or the o...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
In this work we introduce the principle of comprehensible security, which demands that the security ...
This paper presents a framework for security requirements elicitation and analysis. The framework is...
This chapter presents a process for security requirements elicitation and analysis, based around th...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Context: Security considerations are typically incorporated in the later stages of development as an...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
AbstractSecurity is often an afterthought during software development. Realizing security early, esp...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
Context & motivation: More and more software projects today are security-related in one way or the o...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
In this work we introduce the principle of comprehensible security, which demands that the security ...