A comparison of security requirements engineering methods

B Fabian, S Gürses, M Heisel, T Santen… - Requirements …, 2010‏ - Springer
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …

Security and privacy requirements for cloud computing in healthcare: Elicitation and prioritization from a patient perspective

T Ermakova, B Fabian, M Kornacka, S Thiebes… - ACM Transactions on …, 2020‏ - dl.acm.org
Cloud computing promises essential improvements in healthcare delivery performance.
However, its wide adoption in healthcare is yet to be seen, one main reason being patients' …

Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures

S Papastergiou, H Mouratidis, EM Kalogeraki - Evolving Systems, 2021‏ - Springer
In recent years, the use of information technologies in Critical Infrastructures is gradually
increasing. Although this brings benefits, it also increases the possibility of security attacks …

Social and Human Elements of Information Security: Emerging Trends and Countermeasures: Emerging Trends and Countermeasures

M Gupta, R Sharman - 2008‏ - books.google.com
More often than not, it is becoming increasingly evident that the weakest links in the
information-security chain are the people. Due an increase in information security threats, it …

Distributed ONS and its Impact on Privacy

B Fabian, O Gunther - 2007 IEEE International Conference on …, 2007‏ - ieeexplore.ieee.org
The EPC Network is an industry proposal to build a global information architecture for
objects carrying RFID tags with electronic product codes (EPC). A so-called object naming …

A pattern system for security requirements engineering

D Hatebur, M Heisel, H Schmidt - The Second International …, 2007‏ - ieeexplore.ieee.org
We present a pattern system/or security requirements engineering, consisting of security
problem frames and concretized security problem frames. These are special kinds of …

[PDF][PDF] Multilateral security requirements analysis for preserving privacy in ubiquitous environments

S Gürses, B Berendt, T Santen - Proceedings of the UKDU …, 2006‏ - lirias.kuleuven.be
Privacy is of great concern in ubiquitous environments in which various technologies collect
vast amounts of information about ubiquitous users with differing privacy and security …

[PDF][PDF] Security and Privacy System Requirements for Adopting Cloud Computing in Healthcare Data Sharing Scenarios.

T Ermakova, B Fabian, R Zarnekow - AMCIS, 2013‏ - core.ac.uk
The emerging cloud computing technology enables new essential scenarios in healthcare,
in particular those of data sharing among practitioners. Nevertheless, their security and …

A security engineering process based on patterns

D Hatebur, M Heisel, H Schmidt - 18th International Workshop …, 2007‏ - ieeexplore.ieee.org
We present a security engineering process based on security problem frames and
concretized security problem frames. Both kinds of frames constitute patterns for analyzing …

A greater understanding of social networks privacy requirements: The user perspective

MB Islam, J Watson, R Iannella, S Geva - Journal of Information Security …, 2017‏ - Elsevier
Social Networks (SN) require an accurate understanding of the complex privacy
requirements of users to demonstrate respect for user privacy requirements whilst also …