Mouratidis, Haralambos and Giorgini, Paolo and Manson, Gordon (2004) ‘Using Security Attack Scenarios to Analyse Security During Information Systems Design’, Proceedings International Conference on Enterprise Information Systems, Porto-Portugal, pp. 10-17.
Mouratidis, H (2004) ICEIS.pdf - Presentation
Available under License Creative Commons Attribution No Derivatives.
Download (190Kb) | Preview
It has been widely argued in the literature that security concerns should be integrated with software engineering practices. However, only recently work has been initiated towards this direction. Most of this work, however, only considers how security can be analysed during the development lifecycles and not how the security of an information system can be tested during the analysis and design stages. In this paper we present results from the development of a technique, which is based on the use of scenarios, to test the reaction of an information system against potential security attacks.
|Item Type:||Conference or Event Item (Paper)|
|Additional Information:||Citation: Mouratidis, H., Giorgini, P., Manson, G. (2004) ‘Using Security Attack Scenarios to Analyse Security During Information Systems Design’ Proceedings International Conference on Enterprise Information Systems, Porto-Portugal, pp. 10-17..|
|Divisions:||Schools > Architecture Computing and Engineering, School of|
|Depositing User:||Mr Stephen Grace|
|Date Deposited:||02 Dec 2009 10:10|
|Last Modified:||27 Sep 2012 11:59|
Actions (login required)