Empirical assessment of security requirements and architecture: Lessons learned

2Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Over the past three years, our groups at the University of Leuven and the University of Trento have been conducting a number of experimental studies. In particular, two common themes can be easily identified within our work. First, we have investigated the value of several threat modeling and risk assessment techniques. The second theme relates to the problem of preserving security over time, i.e., security evolution. Although the empirical results obtained in our studies are interesting on their own, the main goal of this chapter is to share our experience. The objective is to provide useful, hands-on insight on this type of research work so that the work of other researchers in the community would be facilitated. The contribution of this chapter is the discussion of the challenges we faced during our experimental work. Contextually, we also outline those solutions that worked out in our studies and could be reused in the field by other studies.

Cite

CITATION STYLE

APA

Scandariato, R., Paci, F., Tran, L. M. S., Labunets, K., Yskout, K., Massacci, F., & Joosen, W. (2014). Empirical assessment of security requirements and architecture: Lessons learned. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8431, 35–64. https://doi.org/10.1007/978-3-319-07452-8_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free