Sciweavers

674 search results - page 1 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
ACSAC
1999
IEEE
14 years 3 months ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
ACSAC
2001
IEEE
14 years 2 months ago
Abuse-Case-Based Assurance Arguments
This paper describes an extension to abuse-casebased security requirements analysis that provides a lightweight means of increasing assurance in security relevant software. The ap...
John P. McDermott
ASE
2008
120views more  ASE 2008»
13 years 11 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
ACSAC
2000
IEEE
14 years 3 months ago
Security Against Compelled Disclosure
Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be tu...
Ian Brown, B. Laurie