When a system's context of use changes, the security impact may be felt in other contexts. Risks mitigated for one operational context may continue to pose a danger in others due to contextual differences in assets, threats and vulnerabilities. The research presented will identify security factors in these contexts of use, and describe their application to secure systems design. The contributions of this research lead to conceptual models, processes and tool-support which better situate requirements and risk analysis for different contexts of use
Abstract—Security is primarily concerned with protecting assets from harm. Identifying and evaluatin...
International audienceSecurity patterns capture proven security knowledge to help analysts tackle se...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...
When a system's context of use changes, the security impact may be felt in other contexts. Risks mit...
When a system’s context of use changes, the security im-pact may be felt in other contexts. Risks mi...
Many systems are not designed for their contexts of operation. Subtle changes to context may lead to...
Many systems are not designed for their contexts of oper-ation. Subtle changes to context may lead t...
This paper seeks to provide an overview of how companies assess and manage security risks in practic...
Safety and security are highly related concepts [1] [2] [3]. Both deal with the protection of valuab...
Employing a design solution can satisfy some requirements while having negative side-effects on some...
The objective of my research is to improve and support the process of Information security Risk Asse...
Abstract: In networked environments, the importance of eliciting security require-ments as part of t...
Today, companies are required to be in control of the security of their IT assets. This is especiall...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
The objective of my research is to improve and support the process of Information security Risk Asse...
Abstract—Security is primarily concerned with protecting assets from harm. Identifying and evaluatin...
International audienceSecurity patterns capture proven security knowledge to help analysts tackle se...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...
When a system's context of use changes, the security impact may be felt in other contexts. Risks mit...
When a system’s context of use changes, the security im-pact may be felt in other contexts. Risks mi...
Many systems are not designed for their contexts of operation. Subtle changes to context may lead to...
Many systems are not designed for their contexts of oper-ation. Subtle changes to context may lead t...
This paper seeks to provide an overview of how companies assess and manage security risks in practic...
Safety and security are highly related concepts [1] [2] [3]. Both deal with the protection of valuab...
Employing a design solution can satisfy some requirements while having negative side-effects on some...
The objective of my research is to improve and support the process of Information security Risk Asse...
Abstract: In networked environments, the importance of eliciting security require-ments as part of t...
Today, companies are required to be in control of the security of their IT assets. This is especiall...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
The objective of my research is to improve and support the process of Information security Risk Asse...
Abstract—Security is primarily concerned with protecting assets from harm. Identifying and evaluatin...
International audienceSecurity patterns capture proven security knowledge to help analysts tackle se...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...