Argumentation has been proved as a simple yet powerful approach to manage conflicts in reasoning with the purpose to find subsets of ?surviving? arguments. Our intent is to exploit such form of resolution to support the? administration of security in complex systems, e.g., in case threat countermeasures are in conflict with non-functional requirements. The proposed formalisation is able to find the required security controls and explicitly provide arguments supporting this selection. Therefore, an explanation automatically comes as part of the suggested solution, facilitating human comprehension
Information Security Risk Assessment can be viewed as part of requirements engineering because it is...
non-peer-reviewedWhen showing that a software system meets certain security requirements, it is ofte...
When showing that a software system meets certain security requirements, it is often necessary to wo...
The increase of connectivity and the impact it has in every day life is raising new and existing sec...
International audienceRecent security concerns related to future embedded systems make enforcement o...
Abstract. Firewalls are important perimeter security mechanisms that imple-ment an organisation’s ne...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
Identifying threats and risks to complex systems often requires some form of brainstorming. In addit...
non-peer-reviewedWhen software systems are verified against security requirements, formal and inform...
peer reviewedThis paper studies methodologically robust options for giving logical contents to node...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
Information Security Risk Assessment can be viewed as part of requirements engineering because it is...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
Information Security Risk Assessment can be viewed as part of requirements engineering because it is...
non-peer-reviewedWhen showing that a software system meets certain security requirements, it is ofte...
When showing that a software system meets certain security requirements, it is often necessary to wo...
The increase of connectivity and the impact it has in every day life is raising new and existing sec...
International audienceRecent security concerns related to future embedded systems make enforcement o...
Abstract. Firewalls are important perimeter security mechanisms that imple-ment an organisation’s ne...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
Identifying threats and risks to complex systems often requires some form of brainstorming. In addit...
non-peer-reviewedWhen software systems are verified against security requirements, formal and inform...
peer reviewedThis paper studies methodologically robust options for giving logical contents to node...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
Information Security Risk Assessment can be viewed as part of requirements engineering because it is...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
Information Security Risk Assessment can be viewed as part of requirements engineering because it is...
non-peer-reviewedWhen showing that a software system meets certain security requirements, it is ofte...
When showing that a software system meets certain security requirements, it is often necessary to wo...