Goal-directed requirements acquisition
6IWSSD Selected Papers of the Sixth International Workshop on Software Specification and Design
Four dark corners of requirements engineering
ACM Transactions on Software Engineering and Methodology (TOSEM)
Communications of the ACM
Handling Obstacles in Goal-Oriented Requirements Engineering
IEEE Transactions on Software Engineering - special section on current trends in exception handling—part II
Problem frames: analyzing and structuring software development problems
Problem frames: analyzing and structuring software development problems
Modelling strategic relationships for process reengineering
Modelling strategic relationships for process reengineering
Elaborating Security Requirements by Construction of Intentional Anti-Models
Proceedings of the 26th International Conference on Software Engineering
Computer Standards & Interfaces
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Research Directions in Requirements Engineering
FOSE '07 2007 Future of Software Engineering
Alignment of Misuse Cases with Security Risk Management
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
About face 3: the essentials of interaction design
About face 3: the essentials of interaction design
The case against a positivist philosophy of requirements engineering
Requirements Engineering
Reflecting human values in the digital age
Communications of the ACM - Being Human in the Digital Age
Requirements Engineering - Special Issue on RE'09: Security Requirements Engineering; Guest Editors: Eric Dubois and Haralambos Mouratidis
Towards a Unified Framework for Contextual Variability in Requirements
IWSPM '09 Proceedings of the 2009 Third International Workshop on Software Product Management
The 6th International Workshop on Software Engineering for Secure Systems (SESS'10)
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
Proceedings of the 2010 workshop on New security paradigms
HCSE'10 Proceedings of the Third international conference on Human-centred software engineering
Barry is not the weakest link: eliciting secure system requirements with personas
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Requirements sensemaking using concept maps
HCSE'12 Proceedings of the 4th international conference on Human-Centered Software Engineering
Model-driven architectural risk analysis using architectural and contextualised attack patterns
Proceedings of the Workshop on Model-Driven Security
Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS
International Journal of Secure Software Engineering
Hi-index | 0.00 |
There is a growing recognition of the need for secure software engineering approaches addressing both technical and human factors. Existing approaches to secure software engineering focus on the need for technical security to the detriment of usability. This paper presents the IRIS (Integrating Requirements and Information Security) meta-model, a conceptual model for usable secure requirements engineering. We describe a practical application of the meta-model through a case study in the Critical Infrastructure domain.