Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements elicitation and analysis centered on vulnerabilities. The framework offers modeling and analysis facilities to assist system designers in analyzing vulnerabilities and their effects on the system; identifying potential attackers and analyzing their behavior for compromising the system; and identifying and analyzing the countermeasures to protect the system. The framework proposes a qualitative goal model evaluation analysis for assessing the risks of v...
Abstract. Various security requirements sources need to be incorporated when developing security req...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Caring for security at requirements engineering time is a message that has finally received some att...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
Employing a design solution can satisfy some requirements while having negative side-effects on some...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Context: Security considerations are typically incorporated in the later stages of development as an...
We are developing an approach using Jackson's Problem Frames to analyse security problems in or...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Recently, there has been an increase of reported security threats hitting organizations. Some of the...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
Large amount of (security) faults existing in software systems could be complex and hard to identify...
Abstract. Vulnerabilities are weaknesses in the requirements, design, and im-plementation, which att...
Abstract. Various security requirements sources need to be incorporated when developing security req...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Caring for security at requirements engineering time is a message that has finally received some att...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
Employing a design solution can satisfy some requirements while having negative side-effects on some...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Context: Security considerations are typically incorporated in the later stages of development as an...
We are developing an approach using Jackson's Problem Frames to analyse security problems in or...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Recently, there has been an increase of reported security threats hitting organizations. Some of the...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
Large amount of (security) faults existing in software systems could be complex and hard to identify...
Abstract. Vulnerabilities are weaknesses in the requirements, design, and im-plementation, which att...
Abstract. Various security requirements sources need to be incorporated when developing security req...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
Security is a focus in many systems that are developed today, yet this aspect of systems development...