Design of a Modelling Language for Information System Security Risk Management

@inproceedings{Mayer2007DesignOA,
  title={Design of a Modelling Language for Information System Security Risk Management},
  author={Nicolas Mayer and Patrick Heymans and Raimundas Matulevicius},
  booktitle={RCIS},
  year={2007}
}
Nowadays, security has become one of the most demanded characteristics of information systems. However, the ways to address information systems security still lack consensus and integration. On the one hand, researchers have extended various modelling languages and methods with security-oriented constructs in order to take security concerns into account throughout the development lifecycle. On the other hand, practitioners have developed risk management methods to help estimate the relative… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 27 extracted citations

A Problem-Based Threat Analysis in Compliance with Common Criteria

2013 International Conference on Availability, Reliability and Security • 2013
View 3 Excerpts
Highly Influenced

Towards Security Risk-Oriented Misuse Cases

Business Process Management Workshops • 2012
View 4 Excerpts
Highly Influenced

Fundamentals of Secure System Modelling

Springer International Publishing • 2017

Pattern and Security Requirements

Springer International Publishing • 2015
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 21 references

Matulevičius, “Design of a Modelling Language for Information System Security Risk Management,

N. Mayer, R. P. Heymans
Technical Report, • 2006
View 10 Excerpts
Highly Influenced

Elaborating security requirements by construction of intentional anti-models

Proceedings. 26th International Conference on Software Engineering • 2004
View 5 Excerpts
Highly Influenced

Using abuse frames to bound the scope of security problems

Proceedings. 12th IEEE International Requirements Engineering Conference, 2004. • 2004
View 4 Excerpts
Highly Influenced

A framework for Security Requirements Engineering,

J. Moffett, B. A. Nuseibeh
2003
View 7 Excerpts
Highly Influenced

Contributions méthodologiques pour l’amélioration de l’analyse des risques

E. Dubois, N. Mayer, A. Rifaut, V. Rosener
Book Chapter in: T. Ebrahimi, F. Leprévost, B. Warusfel, “Enjeux de la sécurité multimédia”, Traité IC2 - Information, Commande, Communication, Hermès - Lavoisier • 2006
View 3 Excerpts

Similar Papers

Loading similar papers…