A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Discovering "unknown known" security requirements
2016
Proceedings of the 38th International Conference on Software Engineering - ICSE '16
Security is one of the biggest challenges facing organisations in the modern hyper-connected world. A number of theoretical security models are available that provide best practice security guidelines and are widely utilised as a basis to identify and operationalise security requirements. Such models often capture high-level security concepts (e.g., whitelisting, secure configurations, wireless access control, data recovery, etc.), strategies for operationalising such concepts through specific
doi:10.1145/2884781.2884785
dblp:conf/icse/RashidNRECB16
fatcat:wf2rm5l3wjhyrj2djxvpqk5j3q