2008 11th IEEE High Assurance Systems Engineering Symposium 2008
DOI: 10.1109/hase.2008.57
|View full text |Cite
|
Sign up to set email alerts
|

Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…Security properties are the targets the customer establishes for their security program. Without security properties, they do not know what they are trying to accomplish for security and therefore will not reach any goals [43]. Security requirement (SR) engineering can provide a foundation for developing secure systems.…”
Section: Security Properties and Requirementsmentioning
confidence: 99%
See 2 more Smart Citations
“…Security properties are the targets the customer establishes for their security program. Without security properties, they do not know what they are trying to accomplish for security and therefore will not reach any goals [43]. Security requirement (SR) engineering can provide a foundation for developing secure systems.…”
Section: Security Properties and Requirementsmentioning
confidence: 99%
“…On the other hand, we also found studies focused on showing challenges and practitioners perspectives in this context. However, few authors have addressed the specific problems of security verification activities ( [12,20,43]). The picture is even poorer in the agile context as concluded in [56].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Approaches introducing a general order. Peine, Jawurek, and Mandel introduce security goal indicator trees [20] in which nodes can be related by a notion of conditional dependency and Boolean connectors. The authors, however, do not formally specify the syntax and semantics of the model.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…The language was developed as a more expressive replacement for vulnerability cause graphs [12] (used to model the causes of vulnerabilities), security activity graphs [13] (used to model the alternatives for performing security-related activities), security goal indicator trees [14] (used to model the process of goal-driven inspection) and attack trees [15] (used to model how to perform attacks). SGMs provide richer relationships between model elements, a key property when being used for automated applications such as passive testing.…”
Section: Security Goal Modelsmentioning
confidence: 99%