Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Towards requirements-driven information systems engineering: the Tropos project
Information Systems - The 13th international conference on advanced information systems engineering (CAiSE*01)
Initial Industrial Experience of Misuse Cases in Trade-Off Analysis
RE '02 Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering
Security and Privacy Requirements Analysis within a Social Setting
RE '03 Proceedings of the 11th IEEE International Conference on Requirements Engineering
Deriving security requirements from crosscutting threat descriptions
Proceedings of the 3rd international conference on Aspect-oriented software development
Object-Oriented Software Engineering: A Use Case Driven Approach
Object-Oriented Software Engineering: A Use Case Driven Approach
Applying Security Design Analysis to a service-based system: Research Articles
Software—Practice & Experience - Grid Security
Building security requirements with CLASP
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
IEEE Security and Privacy
Integrating security and systems engineering: towards the modelling of secure information systems
CAiSE'03 Proceedings of the 15th international conference on Advanced information systems engineering
Security engineering using problem frames
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
Proceedings of the 9th ACM international symposium on Mobility management and wireless access
Hi-index | 0.00 |
Despite the availability of approaches to specifying security requirements, we have identified a lack of comparative studies of those approaches and, subsequently, lack of guidance and useful tools to determine the most appropriate approach for a specific project. In this paper we propose SRRS (Security Requirements Recommendation System), which takes user input about the most desirable characteristics for their project and recommends the most appropriate approach. We provide an example of applying our system, and show how the SRRS process works in general.