This paper presents SeCMER, a tool for requirements evolution management developed in the context of the SecureChange project. The tool supports automatic detection of requirement changes and violation of security properties using change-driven transformations. The tool also supports argumentation analysis to check security properties are preserved by evolution and to identify new security properties that should be taken into account
The goal of SecReq [2] is to assist all steps in security requirements elicitation, as well as provi...
Abstract—Security issues can have a significant negative im-pact on the business or reputation of an...
There has been a growing concern on the importance of security with the rise of phenomena, such as e...
Abstract. This paper presents SeCMER, a tool for requirements evolu-tion management developed in the...
Requirements evolution management is a daunting process. Requirements change continuously making the...
Long-lived software systems often undergo evolution over an extended period of time. Evolution of th...
Security in long-living information systems requires an on-going and systematic evolution of knowled...
We present a process to develop secure software with an extensive pattern-based security requirement...
Software systems are made to evolve in response to changes in their contexts and requirements. As t...
Capturing security requirements is a complex process, but it is crucial to the success of a secure s...
Abstract. Various security requirements sources need to be incorporated when developing security req...
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the re...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets ...
The goal of SecReq [2] is to assist all steps in security requirements elicitation, as well as provi...
Abstract—Security issues can have a significant negative im-pact on the business or reputation of an...
There has been a growing concern on the importance of security with the rise of phenomena, such as e...
Abstract. This paper presents SeCMER, a tool for requirements evolu-tion management developed in the...
Requirements evolution management is a daunting process. Requirements change continuously making the...
Long-lived software systems often undergo evolution over an extended period of time. Evolution of th...
Security in long-living information systems requires an on-going and systematic evolution of knowled...
We present a process to develop secure software with an extensive pattern-based security requirement...
Software systems are made to evolve in response to changes in their contexts and requirements. As t...
Capturing security requirements is a complex process, but it is crucial to the success of a secure s...
Abstract. Various security requirements sources need to be incorporated when developing security req...
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the re...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets ...
The goal of SecReq [2] is to assist all steps in security requirements elicitation, as well as provi...
Abstract—Security issues can have a significant negative im-pact on the business or reputation of an...
There has been a growing concern on the importance of security with the rise of phenomena, such as e...