ViewPoints: meaningful relationships are difficult!
Proceedings of the 25th International Conference on Software Engineering
Elaborating Security Requirements by Construction of Intentional Anti-Models
Proceedings of the 26th International Conference on Software Engineering
Research Directions in Requirements Engineering
FOSE '07 2007 Future of Software Engineering
Aspect-oriented specification of threat-driven security requirements
International Journal of Computer Applications in Technology
Towards the development of privacy-aware systems
Information and Software Technology
A Method for Extracting Unexpected Scenarios of Embedded Systems
Proceedings of the 2006 conference on Knowledge-Based Software Engineering: Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
Proceedings of the 2006 conference on Knowledge-Based Software Engineering: Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
A Conceptual Model for Analysis Method of Extracting Unexpected Obstacles of Embedded Systems
Proceedings of the 2008 conference on Knowledge-Based Software Engineering: Proceedings of the Eighth Joint Conference on Knowledge-Based Software Engineering
Network Security Validation Using Game Theory
OTM '09 Proceedings of the Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, OTM Academy, SWWS, SEMELS, Beyond SAWSDL, and COMBEK 2009
A suggestion for analysis of unexpected obstacles in embedded system
Proceedings of the 2007 conference on Human interface: Part I
Towards a comprehensive framework for secure systems development
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
Security and trust requirements engineering
Foundations of Security Analysis and Design III
Survey and analysis on Security Requirements Engineering
Computers and Electrical Engineering
Secure by Design: Developing Secure Software Systems from the Ground Up
International Journal of Secure Software Engineering
Using SMCD to reduce inconsistencies in misuse case models: A subject-based empirical evaluation
Journal of Systems and Software
Hi-index | 0.01 |
Everyone agrees that security is a problem, ranging from Microsoft to the banks that have been recent victims of rogue traders. What is paradoxical is that there does not seem to be a wholehearted commitment by both academics and industry to treat this topic systematically at the top level of requirements engineering. Our vision is of a future in which we inform the security requirements engineering process by organisational theory. This would act as thebridge between the well-ordered world of the software project informed by conventional requirements and the unexpected world of anti-requirements associated with the malicious user. We frame a vision for the requirements engineering community that would involve the community solving six difficult problems.