Guest editorial preface: special issue on Evolving security and privacy requirements engineering (ESPRE'14) 2014, Sweden.
Beckers, Kristian; Faily, Shamal; Lee, Seok-Won; Mead, Nancy
At the Evolving Security and Privacy Requirements Engineering (ESPRE) workshop, practitioners and researchers interested in security and privacy requirements gather to discuss significant issues in the field. In particular, ESPRE participants probe the interfaces between requirements engineering, security and privacy. At ESPRE workshops, participants also take the first step in evolving security and privacy requirements engineering to meet the needs of stakeholders, ranging from business analysts and security engineers to technology entrepreneurs and privacy advocates. The most recent ESPRE workshop was held in Karlskrona, Sweden in August 2014, and was co-located with the RE 2014 conference.
BECKERS, K., FAILY, S., LEE, S.-W. and MEAD, N. 2015. Guest editorial preface: special issue on Evolving security and privacy requirements engineering (ESPRE'14) 2014, Sweden. International journal of secure software engineering [online], 6(1), pages iv-vii. Available from: https://bit.ly/3pGkcZD
|Journal Article Type||Editorial|
|Conference Name||1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014), co-located with the 22nd IEEE international requirements engineering conference (RE 2014)|
|Conference Location||Karlskrona, Sweden|
|Acceptance Date||Jan 1, 2015|
|Online Publication Date||Mar 30, 2015|
|Publication Date||Mar 30, 2015|
|Deposit Date||Dec 9, 2021|
|Publicly Available Date||Dec 9, 2021|
|Journal||International journal of secure software engineering|
|Peer Reviewed||Peer Reviewed|
|Keywords||Systems security; Data protection; Privacy and computing; Requirements engineering; Software engineering|
|Related Public URLs||https://rgu-repository.worktribe.com/output/1446745|
BECKERS 2015 Guest editorial preface
You might also like
Automation and cyber security risks on the railways: the human factors implications.
Presentation / Conference
Integrated design framework for facilitating systems-theoretic process analysis.
Cybersecurity user requirements analysis: the ECHO approach.
Use-case informed task analysis for secure and usable design solutions in rail.
Visualising personas as goal models to find security tensions.