Recently, there has been an increase of reported security threats hitting organizations. Some of them are originated from the assignments to users of inappropriate permissions on organizational sensitive data. Thus it is crucial for organizations to recognize as early as possible the risks deriving by inappropriate access right management and to identify the solutions that they need to prevent such risks. In this paper, we propose a framework to identify threats during the requirements analysis of organizations' IT systems. With respect to other works which have attempted to include security analysis into requirement engineering process (e.g., KAOS, Elahi et al., Asnar et al.), our framework does not rely on the level of expertise of the se...
There are several approaches to elicit, analyze and specify security requirements ranging from forma...
Caring for security at requirements engineering time is a message that has finally received some att...
Research shows that commonly accepted security requirements are not generally applied in practice. I...
Abstract—Recently, there has been an increase of reported security threats hitting organizations. So...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
The primary goal of this research is to develop a structured object-oriented security requirements a...
The number of insider threats hitting organizations and big enterprises is rapidly growing. Insider ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Context & motivation: More and more software projects today are security-related in one way or the o...
Context: Security considerations are typically incorporated in the later stages of development as an...
There are several approaches to elicit, analyze and specify security requirements ranging from forma...
Caring for security at requirements engineering time is a message that has finally received some att...
Research shows that commonly accepted security requirements are not generally applied in practice. I...
Abstract—Recently, there has been an increase of reported security threats hitting organizations. So...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
The primary goal of this research is to develop a structured object-oriented security requirements a...
The number of insider threats hitting organizations and big enterprises is rapidly growing. Insider ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Context & motivation: More and more software projects today are security-related in one way or the o...
Context: Security considerations are typically incorporated in the later stages of development as an...
There are several approaches to elicit, analyze and specify security requirements ranging from forma...
Caring for security at requirements engineering time is a message that has finally received some att...
Research shows that commonly accepted security requirements are not generally applied in practice. I...