A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Problem-based Elicitation of Security Requirements - The ProCOR Method
2018
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering
Security is of great importance for many software systems. The security of a software system can be compromised by threats, which may harm assets with a certain likelihood, thus constituting a risk. All such risks should be identified, and unacceptable risks should be reduced, which gives rise to security requirements. The relevant security requirements should be known right from the beginning of the software development process. Eliciting security requirements should be done in a systematic
doi:10.5220/0006669400260038
dblp:conf/enase/WirtzHMOS18
fatcat:6zxtfdldqjephpdrdsd4taq4gq