Evaluation of a security and privacy requirements methodology using the physics of notation

3Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security and Privacy Requirements Methodologies are considered an important part of the development process of systems, especially for the ones that contain and process a large amount of critical information and inevitably needs to remain secure and thus, ensuring privacy. These methodologies provide techniques, methods, and norms for tackling security and privacy issues in Information Systems. In this process, the utilisation of effective, clear and understandable modelling languages with sufficient notation is of utmost importance, since the produced models are used not only among IT experts or among security specialists, but also for communication among various stakeholders, in business environments or among novices in an academic environment. This paper evaluates the effectiveness of a Security and Privacy Requirements Engineering methodology, namely Secure Tropos on the nine principles of the Theory of Notation. Our qualitative analysis revealed a partial satisfaction of these principles.

Cite

CITATION STYLE

APA

Diamantopoulou, V., Pavlidis, M., & Mouratidis, H. (2018). Evaluation of a security and privacy requirements methodology using the physics of notation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10683 LNCS, pp. 210–225). Springer Verlag. https://doi.org/10.1007/978-3-319-72817-9_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free