Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
Security is widely recognized as a main challenge in developing software. Security Requirements Engineering is an emerging field at the crossroads between Security and Software Engineering, spurred by the realization that security must be dealt with from the earliest phases of the software development process. This book enables understanding of the deeper issues and challenges in developing secure systems, the concepts for capturing security aspects of socio-technical systems, and the support needed by enterprises for the definition of security policies as dictated by ISO security standards and data protection legislation. The author presents the SI* modeling language and the Secure Tropos methodology to address the problem of modeling and analyzing security requirements at the organizational level. The SI* language employs a set of concepts founded on the notions of permission, delegation, and trust. These concepts are formalized and are shown to support the requirements analysis process through a formal reasoning tool. The Secure Tropos methodology provides facilities for analyzing security requirements and guidelines to identify appropriate protection mechanisms.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
Security is widely recognized as a main challenge in developing software. Security Requirements Engineering is an emerging field at the crossroads between Security and Software Engineering, spurred by the realization that security must be dealt with from the earliest phases of the software development process. This book enables understanding of the deeper issues and challenges in developing secure systems, the concepts for capturing security aspects of socio-technical systems, and the support needed by enterprises for the definition of security policies as dictated by ISO security standards and data protection legislation. The author presents the SI* modeling language and the Secure Tropos methodology to address the problem of modeling and analyzing security requirements at the organizational level. The SI* language employs a set of concepts founded on the notions of permission, delegation, and trust. These concepts are formalized and are shown to support the requirements analysis process through a formal reasoning tool. The Secure Tropos methodology provides facilities for analyzing security requirements and guidelines to identify appropriate protection mechanisms.