When showing that a software system meets certain security requirements, it is often necessary to work with formal and informal descriptions of the system behavior, vulnerabilities, and threats from potential attackers. In earlier work, Haley et al. [1] showed that structured argumentation could deal with such mixed descriptions. However, incomplete and uncertain information, and limited resources force practitioners to settle for good-enough security. To deal with these conditions of practice, we extend the method of Haley et al. with risk assessment. The proposed method, RISA (RIsk assessment in Security Argumentation), uses public catalogs of security expertise to support the risk assessment, and to guide the security argumentation in id...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
Since software products are heavily used in today’s connected society, design and implementation of ...
Employing a design solution can satisfy some requirements while having negative side-effects on some...
non-peer-reviewedWhen showing that a software system meets certain security requirements, it is ofte...
When showing that a software system meets certain security requirements, it is often necessary to wo...
When showing that a software system meets certain security requirements, it is often necessary to wo...
peer-reviewedComputer-based systems are increasingly being exposed to evolving security threats, whi...
Computer-based systems are increasingly being exposed to evolving security threats, which often reve...
Information Security Risk Assessment can be viewed as part of requirements engineering because it is...
Information Security Risk Assessment can be viewed as part of requirements engineering because it is...
Identifying threats and risks to complex systems often requires some form of brainstorming. In addit...
This chapter presents a process for security requirements elicitation and analysis, based around th...
non-peer-reviewedWhen software systems are verified against security requirements, formal and inform...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
Since software products are heavily used in today’s connected society, design and implementation of ...
Employing a design solution can satisfy some requirements while having negative side-effects on some...
non-peer-reviewedWhen showing that a software system meets certain security requirements, it is ofte...
When showing that a software system meets certain security requirements, it is often necessary to wo...
When showing that a software system meets certain security requirements, it is often necessary to wo...
peer-reviewedComputer-based systems are increasingly being exposed to evolving security threats, whi...
Computer-based systems are increasingly being exposed to evolving security threats, which often reve...
Information Security Risk Assessment can be viewed as part of requirements engineering because it is...
Information Security Risk Assessment can be viewed as part of requirements engineering because it is...
Identifying threats and risks to complex systems often requires some form of brainstorming. In addit...
This chapter presents a process for security requirements elicitation and analysis, based around th...
non-peer-reviewedWhen software systems are verified against security requirements, formal and inform...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
This paper proposes using both formal and structured informal arguments to show that an eventual rea...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
Since software products are heavily used in today’s connected society, design and implementation of ...
Employing a design solution can satisfy some requirements while having negative side-effects on some...