Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
1Activity

Table Of Contents

1 Introduction
2 Security Requirements in Current Practice
3 The SQUARE Methodology
4 Advantages of Reuse
5 Related Work
6 Defining a Model of Security Concepts
6.1 Quality Subfactors
6.2 Security Goals
6.3 Layered Defenses
6.4 Threats
6.5 Security Measures
6.6 Relating Levels
7 Writing Reusable Requirements
7.1 Quality Criteria for Requirements
7.2 Need for Common Terminology
7.3 Generic but Useful Requirements
7.4 Right Level of Abstraction
8 Integration into SQUARE
8.1 Step 1: Agree on Definitions
8.2 Step 2: Identify Assets and Goals
8.3 Step 3: Risk Assessment
8.4 Step 4: Choose Requirements
8.5 Step 5: Prioritize Requirements
8.6 Step 6: Review Requirements
9 Recommendations for Future Work
10 Conclusions
Appendix A: Concepts from the Security Model
Appendix B: Examples of Reusable Goals and Requirements
Glossary of Terms
References
0 of .
Results for:
No results containing your search query
P. 1
10tn027

10tn027

Ratings: (0)|Views: 845|Likes:
Published by Ozdemir Mersinoglu

More info:

Published by: Ozdemir Mersinoglu on Sep 21, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/21/2011

pdf

text

original

You're Reading a Free Preview
Pages 5 to 45 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->