The hidden meta-requirements of security and privacy
Download
Author
G Spafford
Entry type
inproceedings
Abstract
hen collecting requirements for software, designers may learn of needs for specific forms of protection to be present. These needs may be translated into requirements for encryption or authentication, but what about the non-obvious aspects of security - including privacy, auditability and assurance - that are usually overlooked in the requirements capture process? When we overlook these issues, we get software that doesn't deserve our trust. In this paper, I discuss some of the aspects of security that are regularly overlooked by designers and suggest some standard questions that should be addressed in every design
Download
Date
2001
Key alpha
Spafford
Note
Requirements Engineering, 2001. Proceedings. Fifth IEEE International Symposium on
Publication Date
2001-01-01

