A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
This paper presents SeCMER, a tool for requirements evolution management developed in the context of the SecureChange project. ... The tool also supports argumentation analysis to check security properties are preserved by evolution and to identify new security properties that should be taken into account. ... In this paper we present SeCMER 1 , a tool for requirement evolution management which provides three main features: a) Modelling requirement evolution: The drawing of requirement models in different state ...doi:10.1007/978-3-642-24755-2_35 fatcat:6svr6kkmljd2ncbe7xlojndyoe
This paper presents the results of a Systematic Literature Mapping, covers the period from 2000 to 2016, whose goal is to understand the current state of approaches concerning privacy and security in RE ... In this scenario, the literature reports that it is necessary to address privacy and security from the Requirements Engineering (RE) phase. ... Another paper presents a tool (SecMER) that can automatically detect changes in requirements and violations of security properties [SCOPUS085] 1 . ...dblp:conf/wer/NettoPS19 fatcat:mzvt45cnyjcjrhgqb3eeg5ah7q
Security is an important quality aspect of modern open software systems. However, it is challenging to keep such systems secure because of evolution. ... The article covers the state of the art on evolution of security requirements, security architectures, secure code, security tests, security models, and security risks as well as security monitoring. ... FP7-256980) and SecureChange (FP7-231101), the FFG project "QE LaB Living Models for Open Systems" (FFG 822740), the FWF project MOBSTECO (FWF P 26194-N15), the DFG project "SecVolution" which is part of ...doi:10.4018/ijsse.2014100103 fatcat:o6aq54ak5zbydk42w4psuaabxq