Software systems are made to evolve in response to changes in their contexts and requirements. As the systems evolve, security concerns need to be analysed in order to evaluate the impact of changes on the systems. We propose to investigate such changes by applying a meta-model of evolving security requirements, which draws on requirements engineering approaches, security analysis, argumentation and software evolution. In this paper, we show how the meta-model can be instantiated using a formalism of temporal logic, called the Event Calculus. The main contribution is a model based approach to argument analysis, supported by a tool which generates templates for formal descriptions of the evolving system. We apply our approach to ...
Increasingly, the success of software systems depends largely on how their security requirements are...
Long-lived software systems often undergo evolution over an extended period of time. Evolution of th...
We present a model-based approach using two dimensions to propagate security restrictions: along the...
Identifying threats and risks to complex systems often requires some form of brainstorming. In addit...
When software systems are verified against security requirements, formal and informal arguments prov...
Due to the security threats faced in the connected world, the consideration of security requirements...
Evolution is an inevitable phenomenon during the life time of a long-lived software systems due to t...
This paper presents SeCMER, a tool for requirements evolution management developed in the context of...
Computer-based systems are increasingly being exposed to evolving security threats, which often reve...
Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets ...
Computer-based systems are increasingly being exposed to evolving security threats, which often reve...
non-peer-reviewedWhen software systems are verified against security requirements, formal and inform...
International audienceThere is a wide range of security solutions on cyber-physical systems, most ai...
Future Internet (FI) applications are the result of composing services and data from different parti...
Abstract—Security is primarily concerned with protecting assets from harm. Identifying and evaluatin...
Increasingly, the success of software systems depends largely on how their security requirements are...
Long-lived software systems often undergo evolution over an extended period of time. Evolution of th...
We present a model-based approach using two dimensions to propagate security restrictions: along the...
Identifying threats and risks to complex systems often requires some form of brainstorming. In addit...
When software systems are verified against security requirements, formal and informal arguments prov...
Due to the security threats faced in the connected world, the consideration of security requirements...
Evolution is an inevitable phenomenon during the life time of a long-lived software systems due to t...
This paper presents SeCMER, a tool for requirements evolution management developed in the context of...
Computer-based systems are increasingly being exposed to evolving security threats, which often reve...
Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets ...
Computer-based systems are increasingly being exposed to evolving security threats, which often reve...
non-peer-reviewedWhen software systems are verified against security requirements, formal and inform...
International audienceThere is a wide range of security solutions on cyber-physical systems, most ai...
Future Internet (FI) applications are the result of composing services and data from different parti...
Abstract—Security is primarily concerned with protecting assets from harm. Identifying and evaluatin...
Increasingly, the success of software systems depends largely on how their security requirements are...
Long-lived software systems often undergo evolution over an extended period of time. Evolution of th...
We present a model-based approach using two dimensions to propagate security restrictions: along the...