Shamal Faily
A meta-model for usable secure requirements engineering.
Faily, Shamal; Fl�chais, Ivan
Authors
Ivan Fl�chais
Abstract
There is a growing recognition of the need for secure software engineering approaches addressing both technical and human factors. Existing approaches to secure software engineering focus on the need for technical security to the detriment of usability. This paper presents the IRIS (Integrating Requirements and Information Security) meta-model, a conceptual model for usable secure requirements engineering. We describe a practical application of the meta-model through a case study in the Critical Infrastructure domain.
Citation
FAILY, S. and FLÉCHAIS, I. 2010. A meta-model for usable secure requirements engineering. In Proceedings of the 2010 ICSE workshop on software engineering for secure systems (SESS '10): co-located with the 32nd ACM/IEEE international conference on software engineering (ICSE 2010), 2-8 May 2010, Cape Town, South Africa. New York: ACM [online], pages 29-35. Available from: https://doi.org/10.1145/1809100.1809105
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 2010 ICSE workshop on software engineering for secure systems (SESS '10) |
Start Date | May 2, 2010 |
Acceptance Date | May 2, 2010 |
Online Publication Date | May 2, 2010 |
Publication Date | Dec 31, 2010 |
Deposit Date | Dec 1, 2021 |
Publicly Available Date | Dec 1, 2021 |
Publisher | Association for Computing Machinery (ACM) |
Peer Reviewed | Peer Reviewed |
Pages | 29-35 |
ISBN | 9781605589657 |
DOI | https://doi.org/10.1145/1809100.1809105 |
Keywords | Human-computer interaction; Software engineering; Security; Critical infrastructure |
Public URL | https://rgu-repository.worktribe.com/output/1427809 |
Files
FAILY 2010 A meta-model for usable secure
(286 Kb)
PDF
Copyright Statement
© ACM
You might also like
Privacy goals for the data lifecycle.
(2022)
Journal Article
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
Evaluating privacy: determining user privacy expectations on the web.
(2021)
Journal Article
DPIA in context: applying DPIA to assess privacy risks of cyber physical systems.
(2020)
Journal Article
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search