Well-defined and unambiguous security requirements are essential for developing secure software systems. Misinterpretation of security terms and insufficient knowledge about security terminology can lead to inappropriate security requirements which, in turn, leave the system vulnerable to attacks. There exist many methods for eliciting and specifying security requirements. Among the possible methods, ontologies and templates can be used in order to elicit and/or specify security requirements. The objective of this study is to identify some common security concepts as well as some generic properties that characterize a security requirement, by comparing how ontologies and templates methods define and use security requirements. A comparison...
Systematically and carefully designed information security metrics can be used to provide evidence o...
Software Requirement Specification (SRS) is frequently evolving to reflect requirements change durin...
The task of specifying and managing security requirements (SR) is a challenging one. Usually SR are ...
Well-defined and unambiguous security requirements are essential for developing secure software syst...
International audienceSecurity is an important issue that needs to be taken into account at all stag...
Critical software vulnerabilities are often caused by incorrect, vague, or missing security requirem...
Security concerns for physical, software and virtual worlds have captured the attention of researche...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
In recent years, security in Information Systems (IS) has become an important issue, and needs to be...
Security requirements managers aim at eliciting, reusing and keeping their sets of requirements. The...
Despite existing methodologies in the field, most requirements engineers are poorly trained to defin...
Attaining high quality in security requirements specification requires first-rate professional exper...
International audienceDespite existing methodologies in the field, most requirements engineers are p...
Knowledge of software security is highly complex since it is quite context-specific and can be appli...
AbstractDefining security requirements is of prime importance for all systems; we usually study the ...
Systematically and carefully designed information security metrics can be used to provide evidence o...
Software Requirement Specification (SRS) is frequently evolving to reflect requirements change durin...
The task of specifying and managing security requirements (SR) is a challenging one. Usually SR are ...
Well-defined and unambiguous security requirements are essential for developing secure software syst...
International audienceSecurity is an important issue that needs to be taken into account at all stag...
Critical software vulnerabilities are often caused by incorrect, vague, or missing security requirem...
Security concerns for physical, software and virtual worlds have captured the attention of researche...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
In recent years, security in Information Systems (IS) has become an important issue, and needs to be...
Security requirements managers aim at eliciting, reusing and keeping their sets of requirements. The...
Despite existing methodologies in the field, most requirements engineers are poorly trained to defin...
Attaining high quality in security requirements specification requires first-rate professional exper...
International audienceDespite existing methodologies in the field, most requirements engineers are p...
Knowledge of software security is highly complex since it is quite context-specific and can be appli...
AbstractDefining security requirements is of prime importance for all systems; we usually study the ...
Systematically and carefully designed information security metrics can be used to provide evidence o...
Software Requirement Specification (SRS) is frequently evolving to reflect requirements change durin...
The task of specifying and managing security requirements (SR) is a challenging one. Usually SR are ...