Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
The contribution of this paper is a technique to assess whether software failures during operational use can invalidate the trust assumptions and, hence, the adequacy of the softw...
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
Abstract—Security requirements often have implicit assumptions about trust relationships among actors. The more actors trust each other, the less stringent the security requireme...