Systematic Treatment of Security Risks during Requirements Engineering

Author(s):  
Roman Wirtz ◽  
Maritta Heisel
2019 ◽  
pp. 1711-1729 ◽  
Author(s):  
Nancy R. Mead ◽  
Saeed Abu-Nimeh

Security requirements engineering identifies security risks in software in the early stages of the development cycle. In this chapter, the authors present the SQUARE security requirements method. They integrate privacy requirements into SQUARE to identify privacy risks in addition to security risks. They then present a privacy elicitation technique and subsequently combine security risk assessment techniques with privacy risk assessment techniques. The authors discuss prototype tools that have been developed to support SQUARE for security and privacy as well as recent workshops that have focused on additional results in the security and privacy requirements area. Finally, the authors suggest future research and case studies needed to further contribute to early lifecycle activities that will address security and privacy-related issues.


Author(s):  
Nancy R. Mead ◽  
Saeed Abu-Nimeh

Security requirements engineering identifies security risks in software in the early stages of the development cycle. In this chapter, the authors present the SQUARE security requirements method. They integrate privacy requirements into SQUARE to identify privacy risks in addition to security risks. They then present a privacy elicitation technique and subsequently combine security risk assessment techniques with privacy risk assessment techniques. The authors discuss prototype tools that have been developed to support SQUARE for security and privacy as well as recent workshops that have focused on additional results in the security and privacy requirements area. Finally, the authors suggest future research and case studies needed to further contribute to early lifecycle activities that will address security and privacy-related issues.


Author(s):  
Saeed Abu-Nimeh ◽  
Nancy R. Mead

Security requirements engineering identifies security risks in software in the early stages of the development cycle. In this chapter, the authors present a security requirements approach dubbed SQUARE. They integrate privacy requirements into SQUARE to identify privacy risks in addition to security risks. They present a privacy elicitation technique and then combine security risk assessment techniques with privacy risk assessment techniques.


Nephrology ◽  
2000 ◽  
Vol 5 (3) ◽  
pp. A97-A97
Author(s):  
Hoy We ◽  
Baker P ◽  
Wang Z ◽  
Cass A ◽  
Mathews Jd ◽  
...  

2013 ◽  
Author(s):  
Satoko Kimpara ◽  
Lynn Henderson ◽  
Larry E. Beutler

Author(s):  
Kanos Matyokurehwa ◽  
◽  
Nehemiah Mavetera ◽  
Osden Jokonya ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document