The effect of trust assumptions on the elaboration of security requirements
@article{Haley2004TheEO, title={The effect of trust assumptions on the elaboration of security requirements}, author={Charles B. Haley and Robin C. Laney and J. Moffett and B. Nuseibeh}, journal={Proceedings. 12th IEEE International Requirements Engineering Conference, 2004.}, year={2004}, pages={102-111} }
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assumptions can affect the scope of the analysis, derivation of security requirements, and in some cases, how functionality is realized. This work presents trust assumptions in the context of analysis of security requirements. A running example shows how trust assumptions can be used by a requirements engineer to help define… CONTINUE READING
Figures and Topics from this paper
67 Citations
Assessing the Effect of Software Failures on Trust Assumptions
- Computer Science
- 2008 19th International Symposium on Software Reliability Engineering (ISSRE)
- 2008
- 2
Engineering Trust Management into Software Models
- Computer Science
- International Workshop on Modeling in Software Engineering (MISE'07: ICSE Workshop 2007)
- 2007
- 9
- PDF
The Trust Management Model of Trusted Software
- Computer Science
- 2009 International Forum on Information Technology and Applications
- 2009
- 2
Problem-based Derivation of Trustworthiness Requirements from Users’ Trust Concerns
- Computer Science
- 2018
Problem-based Derivation of Trustworthiness Requirements from Users’ Trust Concerns
- Computer Science
- 2018 16th Annual Conference on Privacy, Security and Trust (PST)
- 2018
- 1
Security Requirements Engineering: A Framework for Representation and Analysis
- Computer Science
- IEEE Transactions on Software Engineering
- 2008
- 423
- PDF
References
SHOWING 1-10 OF 37 REFERENCES
Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements
- Computer Science
- iTrust
- 2004
- 16
- PDF
Deriving security requirements from crosscutting threat descriptions
- Computer Science
- AOSD '04
- 2004
- 105
- PDF
Abuse-case-based assurance arguments
- Computer Science
- Seventeenth Annual Computer Security Applications Conference
- 2001
- 76
Security requirements engineering: when anti-requirements hit the fan
- Engineering, Computer Science
- Proceedings IEEE Joint International Conference on Requirements Engineering
- 2002
- 119
- PDF
Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard
- Computer Science
- ER
- 2003
- 61
- PDF
Elaborating security requirements by construction of intentional anti-models
- Engineering, Computer Science
- Proceedings. 26th International Conference on Software Engineering
- 2004
- 452
- PDF