Sciweavers

657 search results - page 5 / 132
» Secure and Usable Requirements Engineering
Sort
View
TSE
2008
107views more  TSE 2008»
13 years 7 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
ICSE
2003
IEEE-ACM
14 years 7 months ago
Integration of Usability Techniques into the Software Development Process
Software development organisations are paying more and more attention to the usability of their software products. To raise the usability level of the software product, it is nece...
Xavier Ferré
ACSAC
1999
IEEE
13 years 11 months ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
RE
2009
Springer
14 years 1 months ago
Trust Trade-off Analysis for Security Requirements Engineering
Abstract—Security requirements often have implicit assumptions about trust relationships among actors. The more actors trust each other, the less stringent the security requireme...
Golnaz Elahi, Eric S. K. Yu