We are developing an approach using Jackson's Problem Frames to analyse security problems in order to determine security vulnerabilities. We introduce the notion of an anti-requirement as the requirement of a malicious user that can subvert an existing requirement. We incorporate anti-requirements into so-called abuse frames to represent the notion of a security threat imposed by malicious users in a particular problem context. We suggest how abuse frames can provide a means for bounding the scope of security problems in order to analyse security threats and derive security requirements
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Caring for security at requirements engineering time is a message that has finally received some att...
Context: Security considerations are typically incorporated in the later stages of development as an...
We are developing an approach using Jackson's Problem Frames to analyse security problems in order ...
Abstract. In this paper, we present an approach using problem frames to analyse security problems in...
Security problems arise from the concern for protecting assets from security threats. In a systems ...
and other research outputs Using abuse frames to bound the scope of security prob-lem
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
An important aspect of security requirements is the understanding and listing of the possible threat...
Abstract. An important aspect of security requirements is the understanding and listing of the possi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Caring for security at requirements engineering time is a message that has finally received some att...
Context: Security considerations are typically incorporated in the later stages of development as an...
We are developing an approach using Jackson's Problem Frames to analyse security problems in order ...
Abstract. In this paper, we present an approach using problem frames to analyse security problems in...
Security problems arise from the concern for protecting assets from security threats. In a systems ...
and other research outputs Using abuse frames to bound the scope of security prob-lem
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
An important aspect of security requirements is the understanding and listing of the possible threat...
Abstract. An important aspect of security requirements is the understanding and listing of the possi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Caring for security at requirements engineering time is a message that has finally received some att...
Context: Security considerations are typically incorporated in the later stages of development as an...