Requirement centric security evaluation of software intensive systems

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

4 Citations (Scopus)

Abstract

Development of the information security requirements of practical software-intensive systems is typically ignored, at an inadequate level or relies heavily on the experience of the security professionals. However, it is obvious that security requirements are in the focus in all phases of security engineering. Automated approaches are needed in this field. We introduce a framework for security evaluation based on security requirement definition, behavior modeling and evidence collection.
Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Dependability of Computer Systems, DepCOS-RELCOMEX 2007
PublisherIEEE Institute of Electrical and Electronic Engineers
Pages135-142
ISBN (Print)0-7695-2850-3
DOIs
Publication statusPublished - 2007
MoE publication typeA4 Article in a conference publication
Event2nd International Conference on Dependability of Computer Systems, DepCoS-RELCOMEX 2007 - Szklarska, Poland
Duration: 14 Jun 200716 Jun 2007

Conference

Conference2nd International Conference on Dependability of Computer Systems, DepCoS-RELCOMEX 2007
Abbreviated titleDepCoS-RELCOMEX 2007
CountryPoland
CitySzklarska
Period14/06/0716/06/07

Keywords

  • information security
  • security
  • software-intensive products
  • software
  • software safety

Fingerprint Dive into the research topics of 'Requirement centric security evaluation of software intensive systems'. Together they form a unique fingerprint.

  • Cite this

    Savola, R. (2007). Requirement centric security evaluation of software intensive systems. In Proceedings of the 2nd International Conference on Dependability of Computer Systems, DepCOS-RELCOMEX 2007 (pp. 135-142). IEEE Institute of Electrical and Electronic Engineers. https://doi.org/10.1109/DEPCOS-RELCOMEX.2007.41