Securing the skies: In requirements we trust
Securing the skies: In requirements we trust
The authors describe their experiences applying a security requirements analysis to an air traffic control project using a framework that offers different forms of structured argumentation. In deploying the framework, they also learned several lessons about security requirements.
64-72
Nuseibeh, B.
40911e6f-6da2-490b-8466-52d9e8e1dca8
Haley, C.B.
2a0a22d6-feae-4e5e-b9e2-10951f7f4f2a
Foster, C.
5559934e-d31a-4187-8bc1-bf7f39ddf4f4
September 2009
Nuseibeh, B.
40911e6f-6da2-490b-8466-52d9e8e1dca8
Haley, C.B.
2a0a22d6-feae-4e5e-b9e2-10951f7f4f2a
Foster, C.
5559934e-d31a-4187-8bc1-bf7f39ddf4f4
Nuseibeh, B., Haley, C.B. and Foster, C.
(2009)
Securing the skies: In requirements we trust.
Computer, 42 (9), .
(doi:10.1109/MC.2009.299).
Abstract
The authors describe their experiences applying a security requirements analysis to an air traffic control project using a framework that offers different forms of structured argumentation. In deploying the framework, they also learned several lessons about security requirements.
This record has no associated files available for download.
More information
e-pub ahead of print date: 9 September 2009
Published date: September 2009
Identifiers
Local EPrints ID: 479668
URI: http://eprints.soton.ac.uk/id/eprint/479668
ISSN: 0018-9162
PURE UUID: 46aa3140-1b60-472c-a684-dfbea85a27b6
Catalogue record
Date deposited: 26 Jul 2023 16:46
Last modified: 17 Mar 2024 03:47
Export record
Altmetrics
Contributors
Author:
B. Nuseibeh
Author:
C.B. Haley
Author:
C. Foster
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics