Visual explanations: images and quantities, evidence and narrative
Visual explanations: images and quantities, evidence and narrative
Handling Obstacles in Goal-Oriented Requirements Engineering
IEEE Transactions on Software Engineering - special section on current trends in exception handling—part II
Usability engineering: scenario-based development of human-computer interaction
Usability engineering: scenario-based development of human-computer interaction
Initial Industrial Experience of Misuse Cases in Trade-Off Analysis
RE '02 Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering
Elaborating Security Requirements by Construction of Intentional Anti-Models
Proceedings of the 26th International Conference on Software Engineering
The obstacles and myths of usability and software engineering
Communications of the ACM - The Blogosphere
The Persona Lifecycle: Keeping People in Mind Throughout Product Design
The Persona Lifecycle: Keeping People in Mind Throughout Product Design
REV '06 Proceedings of the 1st international workshop on Requirements Engineering Visualization
Information Visualization: Design for Interaction (2nd Edition)
Information Visualization: Design for Interaction (2nd Edition)
Model-based security analysis in seven steps --- a guided tour to the CORAS method
BT Technology Journal
Security Requirements for the Rest of Us: A Survey
IEEE Software
Integrating security and usability into the requirements and design process
International Journal of Electronic Security and Digital Forensics
Requirements Engineering - Special Issue on RE'09: Security Requirements Engineering; Guest Editors: Eric Dubois and Haralambos Mouratidis
A meta-model for usable secure requirements engineering
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Barry is not the weakest link: eliciting secure system requirements with personas
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Requirements sensemaking using concept maps
HCSE'12 Proceedings of the 4th international conference on Human-Centered Software Engineering
Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework
International Journal of Secure Software Engineering
Guidelines for integrating personas into software engineering tools
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems
Hi-index | 0.00 |
Understanding how to better elicit, specify, and manage requirements for secure and usable software systems is a key challenge in security software engineering, however, there lacks tool-support for specifying and managing the voluminous amounts of data the associated analysis yields. Without these tools, the subjectivity of analysis may increase as design activities progress. This paper describes CAIRIS Computer Aided Integration of Requirements and Information Security, a step toward tool-support for usable secure requirements engineering. CAIRIS not only manages the elements associated with task, requirements, and risk analysis, it also supports subsequent analysis using novel approaches for analysing and visualising security and usability. The authors illustrate an application of CAIRIS by describing how it was used to support requirements analysis in a critical infrastructure case study.