The software engineering community recognized the importance of addressing security requirements with other functional requirements from the beginning of the software development life cycle. Therefore, there are some techniques that have been developed to achieve this goal. Thus, we conducted a theoretical study that focuses on reviewing and evaluating some of the techniques that are used to model and analyze security requirements. Thus, the Abuse Cases, Misuse Cases, Data Sensitivity and Threat Analyses, Strategic Modeling, and Attack Trees techniques are investigated in detail to understand and highlight the similarities and differences between them. We found that using these techniques, in general, help requirements engineer to specify m...
Addressing the challenges of developing secure software systems remains an active research area in s...
International audienceSecurity at the design stage of the software life cycle can be performed by me...
International audienceSecurity at the design stage of the software life cycle can be performed by me...
In recent years, concentration on software design phase for evaluating security into the developing ...
This thesis contributes to three research areas in software security, namely security requirements a...
The primary goal of this research is to develop a structured object-oriented security requirements a...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Context: Security considerations are typically incorporated in the later stages of development as an...
An important aspect of security requirements is the understanding and listing of the possible threat...
Caring for security at requirements engineering time is a message that has finally received some att...
Security has become a primary and prevalent concern for software systems. The past decade has witnes...
Security Requirements Engineering is one of the most important parts of the software development lif...
Context: Security is a growing concern in many organizations. Industries developing software systems...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
Addressing the challenges of developing secure software systems remains an active research area in s...
International audienceSecurity at the design stage of the software life cycle can be performed by me...
International audienceSecurity at the design stage of the software life cycle can be performed by me...
In recent years, concentration on software design phase for evaluating security into the developing ...
This thesis contributes to three research areas in software security, namely security requirements a...
The primary goal of this research is to develop a structured object-oriented security requirements a...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Context: Security considerations are typically incorporated in the later stages of development as an...
An important aspect of security requirements is the understanding and listing of the possible threat...
Caring for security at requirements engineering time is a message that has finally received some att...
Security has become a primary and prevalent concern for software systems. The past decade has witnes...
Security Requirements Engineering is one of the most important parts of the software development lif...
Context: Security is a growing concern in many organizations. Industries developing software systems...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
Addressing the challenges of developing secure software systems remains an active research area in s...
International audienceSecurity at the design stage of the software life cycle can be performed by me...
International audienceSecurity at the design stage of the software life cycle can be performed by me...