A framework for security requirements engineering
@inproceedings{Haley2006AFF, title={A framework for security requirements engineering}, author={Charles B. Haley and J. Moffett and Robin C. Laney and B. Nuseibeh}, booktitle={SESS '06}, year={2006} }
This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. [...] Key Method The system context is described using a problem-centered notation, then this context is validated against the security requirements through construction of a satisfaction argument. The satisfaction argument is in two parts: a formal argument that the system can meet its security requirements, and a…Expand Abstract
170 Citations
Security Requirements Engineering: A Framework for Representation and Analysis
- Computer Science
- IEEE Transactions on Software Engineering
- 2008
- 423
- PDF
A model based security requirements engineering framework applied for online trading system
- Computer Science
- 2011 International Conference on Recent Trends in Information Technology (ICRTIT)
- 2011
- 13
A comparison of security requirements engineering methods
- Engineering, Computer Science
- Requirements Engineering
- 2009
- 219
- PDF
Capturing security requirements for software systems
- Computer Science, Medicine
- Journal of advanced research
- 2014
- 20
- PDF
A scenario-based framework for the security evaluation of software architecture
- Computer Science
- 2010 3rd International Conference on Computer Science and Information Technology
- 2010
- 24
Contextualizing Security Goals: A Method for Multilateral Security Requirements Elicitation
- Computer Science
- Sicherheit
- 2006
- 24
- PDF
References
SHOWING 1-6 OF 6 REFERENCES
Elaborating security requirements by construction of intentional anti-models
- Engineering, Computer Science
- Proceedings. 26th International Conference on Software Engineering
- 2004
- 452
- Highly Influential
- PDF
Applying Security Design Analysis to a service‐based system
- Engineering, Computer Science
- Softw. Pract. Exp.
- 2005
- 16
- Highly Influential
Security and privacy requirements analysis within a social setting
- Computer Science
- Proceedings. 11th IEEE International Requirements Engineering Conference, 2003.
- 2003
- 419
- Highly Influential
- PDF
Problem Frames - Analysing and Structuring Software Development Problems
- Computer Science
- 2000
- 631
- Highly Influential
- PDF
Strategies for Developing Policies and Requirements for Secure E-Commerce Systems
- In E- Commerce Security and Privacy,
- 2001