Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systematically through the various stages of the requirements engineering process. We briefly introduce some of the requirements such a process should meet for high assurance to be provided from the resulting requirements product. A constructive approach to security requirements elicitation, modeling and analysis is then outlined as an attempt to address such meta-requirements. The approach is based on a framework we developed before for generating and resolving obstacles to requirements achievement. Our framework integrates intentional obstacles (or "anti- goals") set up ...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
Abstract: In networked environments, the importance of eliciting security require-ments as part of t...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
Everyone agrees that security is a problem, ranging from Microsoft to the banks that have been rece...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Context: Security considerations are typically incorporated in the later stages of development as an...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
The software engineering community recognized the importance of addressing security requirements wit...
Needs about security are matters little taken into account when managing requirements engineering , ...
Security has become a primary and prevalent concern for software systems. The past decade has witnes...
Large amount of (security) faults existing in software systems could be complex and hard to identify...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
Abstract: In networked environments, the importance of eliciting security require-ments as part of t...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
Everyone agrees that security is a problem, ranging from Microsoft to the banks that have been rece...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Context: Security considerations are typically incorporated in the later stages of development as an...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
The software engineering community recognized the importance of addressing security requirements wit...
Needs about security are matters little taken into account when managing requirements engineering , ...
Security has become a primary and prevalent concern for software systems. The past decade has witnes...
Large amount of (security) faults existing in software systems could be complex and hard to identify...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
Abstract: In networked environments, the importance of eliciting security require-ments as part of t...