Business oriented information security requirements development
Proceedings of the 5th annual conference on Information security curriculum development
Proceedings of the 2008 workshop on New security paradigms
Harmonizing privacy with security principles and practices
IBM Journal of Research and Development
Preliminary security specification for New Zealand's igovt system
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Introducing mitigation use cases to enhance the scope of test cases
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Environment-driven threats elicitation for web applications
KES-AMSTA'11 Proceedings of the 5th KES international conference on Agent and multi-agent systems: technologies and applications
Advanced secure multimedia services for digital homes
Information Systems Frontiers
Survey and analysis on Security Requirements Engineering
Computers and Electrical Engineering
Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS
International Journal of Secure Software Engineering
Not Ready for Prime Time: A Survey on Security in Model Driven Development
International Journal of Secure Software Engineering
Hi-index | 0.00 |
Information security requirements are important in all software engineering projects, not only to ensure the correct level of security in the end product but also to avoid implementing security solutions that turn out to be a bad fit. This article compares methods for eliciting and describing security requirements in software development projects, from the viewpoint of developers without extensive security skills. As the authors argue, all software projects need a well-balanced amount of security awareness from the beginning. This article is part of a special issue on Security of the Rest of Us.