International audienceRecent security concerns related to future embedded systems make enforcement of security requirements one of the most critical phases when designing such systems. This paper introduces an approach for efficient enforcement of security requirements based on argumentative logic, especially reasoning about activation or deactivation of different security mechanisms under certain functional and non-functional requirements. In this paper, the argumentative logic is used to reason about the rationale behind dynamic enforcement of security policies
The demand for measuring IT security performance is driven by regulatory, financial, and organizatio...
The increase of connectivity and the impact it has in every day life is raising new and existing sec...
Systematically and carefully designed information security metrics can be used to provide evidence o...
International audienceRecent security concerns related to future embedded systems make enforcement o...
This chapter presents a process for security requirements elicitation and analysis, based around th...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
During the last ten years, the impact of security concerns on the development and exploration of dis...
Argumentation has been proved as a simple yet powerful approach to manage conflicts in reasoning wit...
International audience. In recent years, we have observed a shift and a blurring of boundaries betwe...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
This paper presents a framework for security requirements elicitation and analysis. The framework is...
Computer and network security has become of paramount importance in our everyday lives. Cyber attack...
Today's computer systems and applications are based on a globally internet worked infrastructure, co...
The demand for measuring IT security performance is driven by regulatory, financial, and organizatio...
The increase of connectivity and the impact it has in every day life is raising new and existing sec...
Systematically and carefully designed information security metrics can be used to provide evidence o...
International audienceRecent security concerns related to future embedded systems make enforcement o...
This chapter presents a process for security requirements elicitation and analysis, based around th...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
During the last ten years, the impact of security concerns on the development and exploration of dis...
Argumentation has been proved as a simple yet powerful approach to manage conflicts in reasoning wit...
International audience. In recent years, we have observed a shift and a blurring of boundaries betwe...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
This paper presents a framework for security requirements elicitation and analysis. The framework is...
Computer and network security has become of paramount importance in our everyday lives. Cyber attack...
Today's computer systems and applications are based on a globally internet worked infrastructure, co...
The demand for measuring IT security performance is driven by regulatory, financial, and organizatio...
The increase of connectivity and the impact it has in every day life is raising new and existing sec...
Systematically and carefully designed information security metrics can be used to provide evidence o...