Text only About us Job opportunities Contact us
The Computing Department To Facaulty website
Home Printable Version Site Map Ask Us
Search Again?:
Our Research
Using Trust Assumptions in Security Requirements Engineering
Assumptions about the trustworthiness of the various components of a system (including human components) can have a significant effect on the specifications derived from the system’s requirements. Thi...
Using Trust Assumptions with Security Requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, whether implicit or ...
Deriving Security Requirements from Crosscutting Threat Descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General security requirements ...
Arguing Satisfaction of Security Requirements
When considering the security of a system, the analyst must simultaneously work with two types of properties: those that can be shown to be true, and those that must be argued as being true. The first...
© Open University 2004
Your search for 'moffett' returned 9 results