Reusable knowledge in security requirements engineering: a systematic mapping study

A Souag, R Mazo, C Salinesi… - Requirements …, 2016 - Springer
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …

Towards an ontology for privacy requirements via a systematic literature review

M Gharib, P Giorgini, J Mylopoulos - Conceptual Modeling: 36th …, 2017 - Springer
Privacy has been frequently identified as a main concern for systems that deal with personal
information. However, much of existing work on privacy requirements deals with them as a …

Elaborating security requirements by construction of intentional anti-models

A Van Lamsweerde - Proceedings. 26th International …, 2004 - ieeexplore.ieee.org
Caring for security at requirements engineering time is a message that has finally received
some attention recently. However, it is not yet very clear how to achieve this systematically …

Addressing privacy requirements in system design: the PriS method

C Kalloniatis, E Kavakli, S Gritzalis - Requirements Engineering, 2008 - Springer
A major challenge in the field of software engineering is to make users trust the software that
they use in their every day activities for professional or recreational reasons. Trusting …

Analyzing regulatory rules for privacy and security requirements

T Breaux, A Antón - IEEE transactions on software engineering, 2008 - ieeexplore.ieee.org
Information practices that use personal, financial and health-related information are
governed by US laws and regulations to prevent unauthorized use and disclosure. To …

A systematic approach to define the domain of information system security risk management

É Dubois, P Heymans, N Mayer… - … on information systems …, 2010 - Springer
Today, security concerns are at the heart of information systems, both at technological and
organizational levels. With over 200 practitioner-oriented risk management methods and …

Threat-driven modeling and verification of secure software using aspect-oriented Petri nets

D Xu, KE Nygard - IEEE transactions on software engineering, 2006 - ieeexplore.ieee.org
Design-level vulnerabilities are a major source of security risks in software. To improve
trustworthiness of software design, this paper presents a formal threat-driven approach …

[HTML][HTML] Modeling security and privacy requirements: a use case-driven approach

PX Mai, A Goknil, LK Shar, F Pastore, LC Briand… - Information and …, 2018 - Elsevier
Context: Modern internet-based services, ranging from food-delivery to home-caring,
leverage the availability of multiple programmable devices to provide handy services …

Comparing risk identification techniques for safety and security requirements

C Raspotnig, A Opdahl - Journal of systems and software, 2013 - Elsevier
When developing systems where safety and security are important aspects, these aspects
have to be given special attention throughout the development, in particular in the …

[PDF][PDF] From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering

A Van Lamsweerde, S Brohez, R De Landtsheer… - Proc. of …, 2003 - academia.edu
Caring for security at requirements engineering time is a message that has finally received
some attention recently. However, it is not yet very clear how to achieve this systematically …