An important aspect of security requirements is the understanding and listing of the possible threats to the system. Only then can we decide what specific defense mechanisms to use. We show here an approach to list all threats by considering each action in each use case and analyzing how it can be subverted by an internal or external attacker. From this list we can deduce what policies are necessary to prevent or mitigate the threats. These policies can then be used as guidelines for design. The proposed method can include formal design notations for validation and verification.1st International Workshop on Advanced Software Engineering: Expanding the Frontiers of Software Technology - Session 3: Software Development ProcessRed de Universid...
Caring for security at requirements engineering time is a message that has finally received some att...
Misuse case is one of the security requirement elicitation techniques that are easy to use and learn...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...
An important aspect of security requirements is the understanding and listing of the possible threat...
Abstract. An important aspect of security requirements is the understanding and listing of the possi...
In previous work we introduced an approach for finding security requirements based on misuse activit...
The software engineering community recognized the importance of addressing security requirements wit...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Abstract: Computer software is a major source of security risks in information systems. To deal with...
Use cases as part of requirements engineering are often seen as an essential part of systems develop...
Context: Security considerations are typically incorporated in the later stages of development as an...
Use cases as part of requirements engineering are often seen as an essential part of systems develop...
Use cases as part of requirements engineering are often seen as an essential part of systems develop...
We are developing an approach using Jackson's Problem Frames to analyse security problems in or...
Caring for security at requirements engineering time is a message that has finally received some att...
Misuse case is one of the security requirement elicitation techniques that are easy to use and learn...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...
An important aspect of security requirements is the understanding and listing of the possible threat...
Abstract. An important aspect of security requirements is the understanding and listing of the possi...
In previous work we introduced an approach for finding security requirements based on misuse activit...
The software engineering community recognized the importance of addressing security requirements wit...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Abstract: Computer software is a major source of security risks in information systems. To deal with...
Use cases as part of requirements engineering are often seen as an essential part of systems develop...
Context: Security considerations are typically incorporated in the later stages of development as an...
Use cases as part of requirements engineering are often seen as an essential part of systems develop...
Use cases as part of requirements engineering are often seen as an essential part of systems develop...
We are developing an approach using Jackson's Problem Frames to analyse security problems in or...
Caring for security at requirements engineering time is a message that has finally received some att...
Misuse case is one of the security requirement elicitation techniques that are easy to use and learn...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...