Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements elicitation and analysis centered on vulnerabilities. The framework offers modeling and analysis facilities to assist system designers in analyzing vulnerabilities and their effects on the system; identifying potential attackers and analyzing their behavior for compromising the system; and identifying and analyzing the countermeasures to protect the system. The framework proposes a qualitative goal model evaluation analysis for assessing the risks of v...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Recently, there has been an increase of reported security threats hitting organizations. Some of the...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Caring for security at requirements engineering time is a message that has finally received some att...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
Employing a design solution can satisfy some requirements while having negative side-effects on some...
Employing a design solution can satisfy some requirements while having negative side-effects on some...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Context: Security considerations are typically incorporated in the later stages of development as an...
We are developing an approach using Jackson's Problem Frames to analyse security problems in or...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Recently, there has been an increase of reported security threats hitting organizations. Some of the...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Caring for security at requirements engineering time is a message that has finally received some att...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
Employing a design solution can satisfy some requirements while having negative side-effects on some...
Employing a design solution can satisfy some requirements while having negative side-effects on some...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Context: Security considerations are typically incorporated in the later stages of development as an...
We are developing an approach using Jackson's Problem Frames to analyse security problems in or...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Recently, there has been an increase of reported security threats hitting organizations. Some of the...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...