Goal-directed requirements acquisition
6IWSSD Selected Papers of the Sixth International Workshop on Software Specification and Design
Dealing with non-functional requirements: three experimental studies of a process-oriented approach
Proceedings of the 17th international conference on Software engineering
SAAM: a method for analyzing the properties of software architectures
ICSE '94 Proceedings of the 16th international conference on Software engineering
Software architecture in practice
Software architecture in practice
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Design and use of software architectures: adopting and evolving a product-line approach
Design and use of software architectures: adopting and evolving a product-line approach
Software engineering (6th ed.)
Software engineering (6th ed.)
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
ER '02 Proceedings of the 21st International Conference on Conceptual Modeling
A Requirements-Driven Development Methodology
CAiSE '01 Proceedings of the 13th International Conference on Advanced Information Systems Engineering
Using Abuse Case Models for Security Requirements Analysis
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Model Checking Early Requirements Specifications in Tropos
RE '01 Proceedings of the Fifth IEEE International Symposium on Requirements Engineering
Modelling strategic relationships for process reengineering
Modelling strategic relationships for process reengineering
Architectural styles and the design of network-based software architectures
Architectural styles and the design of network-based software architectures
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Eliciting confidentiality requirements in practice
CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
A framework for security requirements engineering
Proceedings of the 2006 international workshop on Software engineering for secure systems
Introducing privacy in a hospital information system
Proceedings of the fourth international workshop on Software engineering for secure systems
Do secure information system design methods provide adequate modeling support?
Information and Software Technology
Journal of Systems and Software
CAiSE '08 Proceedings of the 20th international conference on Advanced Information Systems Engineering
SRRS: a recommendation system for security requirements
Proceedings of the 2008 international workshop on Recommendation systems for software engineering
An engineering process for developing Secure Data Warehouses
Information and Software Technology
A UML 2.0 profile to define security requirements for Data Warehouses
Computer Standards & Interfaces
Later stages support for security requirements
The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations
A conceptual model for privacy policies
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
Privacy requirements engineering for trustworthy e-government services
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Controlling security of software development with multi-agent system
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part IV
CAiSE'11 Proceedings of the 23rd international conference on Advanced information systems engineering
A metamodelling approach for i* model translations
CAiSE'11 Proceedings of the 23rd international conference on Advanced information systems engineering
Making explicit some impliciti* language decisions
ER'11 Proceedings of the 30th international conference on Conceptual modeling
Towards a comprehensive framework for secure systems development
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
A security-focused engineering process for systems of embedded components
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systemss
How to select a security requirements method? a comparative study with students and practitioners
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Modelling Security Using Trust Based Concepts
International Journal of Secure Software Engineering
Hi-index | 0.00 |
Security is a crucial issue for information systems. Traditionally, security is considered after the definition of the system. However, this approach often leads to problems, which translate into security vulnerabilities. From the viewpoint of the traditional security paradigm, it should be possible to eliminate such problems through better integration of security and systems engineering. This paper argues for the need to develop a methodology that considers security as an integral part of the whole system development process. The paper contributes to the current state of the art by proposing an approach that considers security concerns as an integral part of the entire system development process and by relating this approach with existing work. The different stages of the approach are described with the aid of a case study; a health and social care information system.