Requirements-driven adaptive security: Protecting variable assets at runtime

@article{Salehie2012RequirementsdrivenAS,
  title={Requirements-driven adaptive security: Protecting variable assets at runtime},
  author={Mazeiar Salehie and Liliana Pasquale and Inah Omoronyia and Raian Ali and Bashar Nuseibeh},
  journal={2012 20th IEEE International Requirements Engineering Conference (RE)},
  year={2012},
  pages={111-120}
}
Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets are therefore key activities in any security engineering process - from modeling threats and attacks, discovering existing vulnerabilities, to selecting appropriate countermeasures. However, despite their crucial role, assets are often neglected during the development of secure software systems. Indeed, many systems are designed with fixed security boundaries and assumptions, without the… CONTINUE READING
Highly Cited
This paper has 79 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 39 extracted citations

On the role of primary and secondary assets in adaptive security: An application in smart grids

2012 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) • 2012
View 5 Excerpts
Highly Influenced

Security: A Critical Quality Attribute in Self-Adaptive Systems

2018 IEEE/ACM 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) • 2018
View 1 Excerpt

A Game-Theoretic Decision-Making Framework for Engineering Self-Protecting Software Systems

2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C) • 2017
View 1 Excerpt
Method Support

80 Citations

0102030'13'15'17'19
Citations per Year
Semantic Scholar estimates that this publication has 80 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 25 references

Elaborating security requirements by construction of intentional anti-models

Proceedings. 26th International Conference on Software Engineering • 2004
View 6 Excerpts
Highly Influenced

Fuzzy Cognitive Maps

International Journal of Man-Machine Studies • 1986
View 8 Excerpts
Highly Influenced

Risk management guide for information technology systems

G. Stoneburner, A. Goguen, A. Feringa
NIST special publication, vol. 800, p. 30, 2002. • 2002
View 3 Excerpts
Highly Influenced

Fuzzy Goals for Requirements-Driven Adaptation

2010 18th IEEE International Requirements Engineering Conference • 2010
View 1 Excerpt