Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security information and knowledge sources and relevant comp...

Full description

Saved in:
Bibliographic Details
Main Authors: Christian Schmitt, Peter Liggesmeyer
Format: Article
Language:English
Published: Riga Technical University 2015-07-01
Series:Complex Systems Informatics and Modeling Quarterly
Subjects:
Online Access:https://csimq-journals.rtu.lv/article/view/1073
Tags: Add Tag
No Tags, Be the first to tag this record!