A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities (original) (raw)
Related papers
Towards a risk-based security requirements engineering framework
2005
A Framework for Security Requirements Engineering
Proceedings of the 2006 …, 2006
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Guest editorial: security requirements engineering: past, present and future
Requirements Engineering, 2010
2009
A Comparison of Security Requirements Engineering Methods
Thomas Santen, Seda Gurses, Benjamin Fabian
Applying a security requirements engineering process
2006
From goal-driven security requirements engineering to secure design
International Journal of Intelligent Systems, 2010
1 Security Requirements Engineering: A Survey
2008
Security Requirements Engineering: A Framework for Representation and Analysis
IEEE Transactions on …, 2008
Journal of Cybersecurity and Privacy, 2021
Defining Security Requirements Through Misuse Actions
IFIP International Federation for Information Processing, 2006
Advances in Intelligent Systems and Computing, 2018
Towards a Catalogue of Reusable Security Requirements, Vulnerabilities and Threats
2018
Vulnerability Analysis Approach To Capturing Information System Safety Threats and Requirements
Lecture Notes in Computer Science, 2014
Security Requirements Engineering; State of the Art and Research Challenges
2008
Introducing abuse frames for analysing security requirements
Journal of Lightwave Technology
Based on a Security Requirements Engineering Process
2010
An Aspect-Oriented Approach to Security Requirements Analysis
30th Annual International Computer Software and Applications Conference (COMPSAC'06), 2006
COMPARATIVE LITERATURE ANALYSIS ON SECURITY REQUIREMENTS ENGINEERING
Software Security Requirements Engineering: State of the Art
Communications in Computer and Information Science, 2015
Validating Cyber Security Requirements: A Case Study
2011
Title: Security in Requirement Engineering for Qualitative Products
International Journal of Engineering and Technology, 2012
Security Risk Management by Qualitative Vulnerability Analysis
2011 Third International Workshop on Security Measurements and Metrics, 2011
Security requirements engineering: The si*modeling language and the Secure Tropos methodology
2010
A prototype tool for modeling and analyzing security requirements from a holistic viewpoint
Security Requirements Engineering: Analysis and Prioritization
Moving from Requirements to Design Confronting Security Issues: A Case Study
Lecture Notes in Computer Science, 2009
Incorporating Security Requirements Engineering into the Dynamic Systems Development Method
2008