When considering the security of a system, the analyst must simultaneously work with two types of properties: those that can be shown to be true, and those that must be argued as being true. The first consists of properties that can be demonstrated conclusively, such as the type of encryption in use or the existence of an authentication scheme. The second consists of things that cannot be so demonstrated but must be considered true for a system to be secure, such as the trustworthiness of a public key infrastructure or the willingness of people to keep their passwords secure. The choices represented by the second case are called trust assumptions, and the analyst should supply arguments explaining why the trust assumptions are valid. Thi...
This article describes the unique challenges facing usable security research and design, and introdu...
This document is the Accepted Manuscript of a conference paper published in Proceedings of the Cambr...
International audienceRecent security concerns related to future embedded systems make enforcement o...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
This chapter presents a process for security requirements elicitation and analysis, based around th...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
This paper presents a framework for security requirements elicitation and analysis. The framework is...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
This position paper describes work on trust assumptions in the con-text of security requirements. We...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
Context: Security considerations are typically incorporated in the later stages of development as an...
When showing that a software system meets certain security requirements, it is often necessary to wo...
The authors describe their experiences applying a security requirements analysis to an air traffic c...
In this work we introduce the principle of comprehensible security, which demands that the security ...
non-peer-reviewedWhen software systems are verified against security requirements, formal and inform...
This article describes the unique challenges facing usable security research and design, and introdu...
This document is the Accepted Manuscript of a conference paper published in Proceedings of the Cambr...
International audienceRecent security concerns related to future embedded systems make enforcement o...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
This chapter presents a process for security requirements elicitation and analysis, based around th...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
This paper presents a framework for security requirements elicitation and analysis. The framework is...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
This position paper describes work on trust assumptions in the con-text of security requirements. We...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
Context: Security considerations are typically incorporated in the later stages of development as an...
When showing that a software system meets certain security requirements, it is often necessary to wo...
The authors describe their experiences applying a security requirements analysis to an air traffic c...
In this work we introduce the principle of comprehensible security, which demands that the security ...
non-peer-reviewedWhen software systems are verified against security requirements, formal and inform...
This article describes the unique challenges facing usable security research and design, and introdu...
This document is the Accepted Manuscript of a conference paper published in Proceedings of the Cambr...
International audienceRecent security concerns related to future embedded systems make enforcement o...