with the elicitation and analysis of security needs to spec-ify security requirements for the system-to-be. In previous work, we have presented STS-ml, a security requirements modelling language for Socio-Technical Systems (STSs) that elicits security needs, using a goal-oriented approach, and derives the security requirements specification based on these needs. Particularly, STS-ml relates security to the interaction among actors in the STS. In this paper, we present STS-Tool, the modelling and analysis support tool for STS-ml. STS-Tool allows designers to model a STS at a high-level of abstraction, while expressing security needs over the interactions between the actors in the STS, and derive security requirements in terms of social commi...
Refining a sociotechnical system (STS) specification with respect to its requirements is a nontrivia...
Abstract. Security has been a growing concern for most large organiza-tions, especially financial an...
Abstract. Various security requirements sources need to be incorporated when developing security req...
Abstract. STS-Tool is the modelling and analysis support tool for STS-ml, our proposed actor- and go...
Abstract. We present the latest version of STS-Tool, the modelling and analysis support tool for STS...
Today’s software systems are situated within larger socio-technical systems, wherein they interact —...
Modern software systems operate within the context of larger socio-technical systems, wherein they i...
Abstract. A Socio-Technical System (STS) is an interplay of humans, organizations and technical syst...
Abstract. Requirements are inherently prone to conflicts, for they originate from stakeholders with ...
Security has been a growing concern for large organizations, especially financial and gov- ernmental...
Abstract. Socio-Technical Systems (STSs) are complex systems composed of both social (i.e., humans a...
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the re...
Security Requirements Engineering (SRE) is concerned with the identification of security needs and t...
Abstract. Composite services foster reuse and efficiency in providing consumers with different funct...
Security Requirements Engineering is an emerging field which lies at the crossroads of Security and ...
Refining a sociotechnical system (STS) specification with respect to its requirements is a nontrivia...
Abstract. Security has been a growing concern for most large organiza-tions, especially financial an...
Abstract. Various security requirements sources need to be incorporated when developing security req...
Abstract. STS-Tool is the modelling and analysis support tool for STS-ml, our proposed actor- and go...
Abstract. We present the latest version of STS-Tool, the modelling and analysis support tool for STS...
Today’s software systems are situated within larger socio-technical systems, wherein they interact —...
Modern software systems operate within the context of larger socio-technical systems, wherein they i...
Abstract. A Socio-Technical System (STS) is an interplay of humans, organizations and technical syst...
Abstract. Requirements are inherently prone to conflicts, for they originate from stakeholders with ...
Security has been a growing concern for large organizations, especially financial and gov- ernmental...
Abstract. Socio-Technical Systems (STSs) are complex systems composed of both social (i.e., humans a...
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the re...
Security Requirements Engineering (SRE) is concerned with the identification of security needs and t...
Abstract. Composite services foster reuse and efficiency in providing consumers with different funct...
Security Requirements Engineering is an emerging field which lies at the crossroads of Security and ...
Refining a sociotechnical system (STS) specification with respect to its requirements is a nontrivia...
Abstract. Security has been a growing concern for most large organiza-tions, especially financial an...
Abstract. Various security requirements sources need to be incorporated when developing security req...