Blog
About

124
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS

      ,

      The 26th BCS Conference on Human Computer Interaction (HCI)

      Human Computer Interaction

      12 - 14 September 2012

      CAIRIS, Requirements Management, Security, Usability

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          As systems become more complex, the potential for security vulnerabilities being introduced increases. If we are to provide assurances about systems we design then we need the means of analysing, managing, and generally making sense of the data that contributes to the design. Unfortunately, despite ongoing research into tools for supporting secure software development, there are few examples of how tools can be used to help build and support design models associated with security and usability. This paper summarises some of our experiences developing and applying CAIRIS: a requirements management tool for usable and secure system design. We describe our motivation for building CAIRIS, summarise how it was built and evaluated, and present our experiences applying it to real world case studies.

          Related collections

          Most cited references 7

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          A meta-model for usable secure requirements engineering

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Persona cases

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Security Requirements for the Rest of Us: A Survey

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2012
                September 2012
                : 1-4
                Affiliations
                Department of Computer Science

                University of Oxford
                Article
                10.14236/ewic/HCI2012.64
                © Shamal Faily et al. Published by BCS Learning and Development Ltd. The 26th BCS Conference on Human Computer Interaction, Birmingham, UK

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                The 26th BCS Conference on Human Computer Interaction
                HCI
                26
                Birmingham, UK
                12 - 14 September 2012
                Electronic Workshops in Computing (eWiC)
                Human Computer Interaction
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article