[CSUSB]>> [CNS]>> [CSE]>> [R J Botting]>> biba.php

Bibliographic Item (1.0)

NuseibehHaleyFoster09
  1. Bashar Nuseibeh & Charles B Haley & Craig Foster
  2. Securing the Skies: In Requirements we Trust
  3. IEEE Computer Magazine V42n9(Sep 2009)pp64-72
  4. =EXPERIENCE ITERATIVE FORMAL SECURITY REQUIREMENTS ANALYSIS ATC TOULMIN ARGUMENT PROOF RISKS SYSTEM ARCHITECTURE STAKEHOLDERS EXPERTS
  5. Advice: Exploit the experts. Exploit nonexperts. Scope the problems. Iterate to mitigate. Formalize but also argue informally.
  6. Used [Jackson01] for architectural models. Used Toulmin to structure arguments and rebuttals.
  7. Security requirements derived from protecting assets and challenging assumptions exposed by form proofs.
  8. Outer arguments on cover hidden assumptions, inner arguments rebut assumptions and lead to mitigation strategies or revisions of requirements.

Search for bibliographic items containing a matching string.


(Search uses POSIX regular expressions and ignores case)

Search for a specific bibliographic item by name.



To see the complete bibliography (1Mb+) select:[Bibliography]