2010
DOI: 10.1007/s00766-010-0114-8
|View full text |Cite
|
Sign up to set email alerts
|

A methodology for security assurance-driven system development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…This is achievable using security assurance cases. A Security assurance case [21] is a semi-formal approach for objectively supporting the claim that a software product mitigates its security risks.…”
Section: Iterative Security Assurance Casesmentioning
confidence: 99%
“…This is achievable using security assurance cases. A Security assurance case [21] is a semi-formal approach for objectively supporting the claim that a software product mitigates its security risks.…”
Section: Iterative Security Assurance Casesmentioning
confidence: 99%
“…Note also that Vivas et al [17] proposed a method for security assurancedriven software development that focuses on relating the assurance cases to the software through the development life-cycle (analysis, design, development, and test). Our method relates the security assurance case to the software as it evolves in increments.…”
Section: Methodology Of Security Reassurance Of Software Incrementsmentioning
confidence: 99%
“…A security assurance case [17], a semi-formal approach for security assurance, is a collection of security-related claims, arguments, and evidences where a claim, i.e., a security goal, is a high-level security requirement, an argument is a justification that a set of (objective) evidences justify that the related claim is satisfied, and an evidence is a result of a verification through, for example, Microsoft Bob would pipe up when the program determined that the user was stuck doing something. Bob's most insecure function occurred when a user attempted three times (unsuccessfully) to type in his or her password.…”
Section: Security Assurance Casesmentioning
confidence: 99%
See 1 more Smart Citation
“…There is also work that shares some synergy with ours and which we plan to further explore and if possible integrate to our approach, such as the work by Vivas et. al [26] on security assurance.…”
Section: Related Workmentioning
confidence: 99%