Security problems arise from the concern for protecting assets from security threats. In a systems development process, the security protection of a system is specified by security requirements, identified from the analysis of the threats to the system. However, as it is often not possible to obtain a full system description until late in the RE process, a security problem often has to be described in the context of a bounded scope, that is, one containing only the domains relevant to some part of the functionality of the full system. By binding the scope of a security problem, it can be described more explicitly and precisely, thereby facilitating the identification and analysis of threats, which in turn drive the elicitation a...
Recently, there has been an increase of reported security threats hitting organizations. Some of the...
This paper presents a framework for security requirements elicitation and analysis. The framework is...
Misuse case is one of the security requirement elicitation techniques that are easy to use and learn...
We are developing an approach using Jackson's Problem Frames to analyse security problems in order ...
We are developing an approach using Jackson's Problem Frames to analyse security problems in or...
and other research outputs Using abuse frames to bound the scope of security prob-lem
Abstract. In this paper, we present an approach using problem frames to analyse security problems in...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...
AbstractSecurity is often an afterthought during software development. Realizing security early, esp...
An important aspect of security requirements is the understanding and listing of the possible threat...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Context: Security considerations are typically incorporated in the later stages of development as an...
Affecting multiple parts in software systems, security requirements often tangle with functional req...
Abstract. We present several problem frames that serve to structure, character-ize and analyze softw...
Recently, there has been an increase of reported security threats hitting organizations. Some of the...
This paper presents a framework for security requirements elicitation and analysis. The framework is...
Misuse case is one of the security requirement elicitation techniques that are easy to use and learn...
We are developing an approach using Jackson's Problem Frames to analyse security problems in order ...
We are developing an approach using Jackson's Problem Frames to analyse security problems in or...
and other research outputs Using abuse frames to bound the scope of security prob-lem
Abstract. In this paper, we present an approach using problem frames to analyse security problems in...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...
AbstractSecurity is often an afterthought during software development. Realizing security early, esp...
An important aspect of security requirements is the understanding and listing of the possible threat...
This paper presents a framework for security requirements elicitation and analysis, based upon the ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Context: Security considerations are typically incorporated in the later stages of development as an...
Affecting multiple parts in software systems, security requirements often tangle with functional req...
Abstract. We present several problem frames that serve to structure, character-ize and analyze softw...
Recently, there has been an increase of reported security threats hitting organizations. Some of the...
This paper presents a framework for security requirements elicitation and analysis. The framework is...
Misuse case is one of the security requirement elicitation techniques that are easy to use and learn...