A requirement engineering driven approach to security architecture design for distributed embedded systems
Texte intégral
Figure
Documents relatifs
The following section introduces a tools and technologies used to manage the requirements and performs a simple comparative study between three tools DOORS, RTM, and Volere, by
Conditional dependence networks represent obligations as particular kinds of dependencies and these obligations are related to notions by means of sanc- tions if the obligation is
How- ever, the applicability of these approaches in the context of security and privacy requirements modeling for multi-device software ecosystems shows limitations with respect to
The main features of requirements engineering for Scrum project management of software development are analyzed.The quality assessment criteria of user stories are
We brifely describe two requirements specification templates, named TERASE and CAMA, and one requirements elicitation guide, named GERSE which is supported by a
We are currently working on SecCo, which will be the socio-technical security mod- elling language for the EU-funded Aniketos project. Aniketos is about ensuring trust- worthiness
We use the model in the approach to support two steps in particular: (1) deriving misuse cases based on the modelled attack patterns and (2) refinement of the high-level misuse cases
A conceptual framework is presented, where the relationships between business vision, critical impact factors and valuable assets (together with their security requirements) are