We are developing an approach using Jackson's Problem Frames to analyse security problems in order to determine security vulnerabilities. We introduce the notion of an anti-requirement as the requirement of a malicious user that can subvert an existing requirement. We incorporate anti-requirements into so-called abuse frames to represent the notion of a security threat imposed by malicious users in a particular problem context. We suggest how abuse frames can provide a means for bounding the scope of security problems in order to analyse security threats and derive security requirements
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
We are developing an approach using Jackson's Problem Frames to analyse security problems in or...
Abstract. In this paper, we present an approach using problem frames to analyse security problems in...
Security problems arise from the concern for protecting assets from security threats. In a systems ...
and other research outputs Using abuse frames to bound the scope of security prob-lem
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
An important aspect of security requirements is the understanding and listing of the possible threat...
Abstract. An important aspect of security requirements is the understanding and listing of the possi...
An important aspect of security requirements is the understanding and listing of the possible threat...
Context: Security considerations are typically incorporated in the later stages of development as an...
Caring for security at requirements engineering time is a message that has finally received some att...
In previous work we introduced an approach for finding security requirements based on misuse activit...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
We are developing an approach using Jackson's Problem Frames to analyse security problems in or...
Abstract. In this paper, we present an approach using problem frames to analyse security problems in...
Security problems arise from the concern for protecting assets from security threats. In a systems ...
and other research outputs Using abuse frames to bound the scope of security prob-lem
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
An important aspect of security requirements is the understanding and listing of the possible threat...
Abstract. An important aspect of security requirements is the understanding and listing of the possi...
An important aspect of security requirements is the understanding and listing of the possible threat...
Context: Security considerations are typically incorporated in the later stages of development as an...
Caring for security at requirements engineering time is a message that has finally received some att...
In previous work we introduced an approach for finding security requirements based on misuse activit...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabi...