Problem frames: analyzing and structuring software development problems
Problem frames: analyzing and structuring software development problems
A comparison of security requirements engineering methods
Requirements Engineering - Special Issue on RE'09: Security Requirements Engineering; Guest Editors: Eric Dubois and Haralambos Mouratidis
Model-Driven Risk Analysis: The CORAS Approach
Model-Driven Risk Analysis: The CORAS Approach
Information Security Automation: How Far Can We Go?
ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
Characterising and Analysing Security Requirements Modelling Initiatives
ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
Hi-index | 0.00 |
Assembling an information security management system according to the ISO 27001 standard is difficult, because the standard provides only sparse support for system development and documentation. We analyse the ISO 27001 standard to determine what techniques and documentation are necessary and instrumental to develop and document systems according to this standard. Based on these insights, we inspect a number of current security requirements engineering approaches to evaluate whether and to what extent these approaches support ISO 27001 system development and documentation. We re-use a conceptual framework originally developed for comparing security requirements engineering methods to relate important terms, techniques, and documentation artifacts of the security requirements engineering methods to the ISO 27001.