• DocumentCode
    3460127
  • Title

    The hidden meta-requirements of security and privacy

  • Author

    Spafford, Gene

  • Author_Institution
    CERIAS, Purdue Univ., West Lafayette, IN, USA
  • fYear
    2001
  • fDate
    2001
  • Firstpage
    10
  • Abstract
    When collecting requirements for software, designers may learn of needs for specific forms of protection to be present. These needs may be translated into requirements for encryption or authentication, but what about the non-obvious aspects of security - including privacy, auditability and assurance - that are usually overlooked in the requirements capture process? When we overlook these issues, we get software that doesn´t deserve our trust. In this paper, I discuss some of the aspects of security that are regularly overlooked by designers and suggest some standard questions that should be addressed in every design
  • Keywords
    auditing; data privacy; security of data; software quality; systems analysis; auditability; authentication; encryption; hidden meta-requirements; privacy; security; software design; software protection; software quality assurance; software requirements capture; software trustworthiness; Authentication; Computer science education; Computer security; Cryptography; Information security; Military computing; Privacy; Protection; Software design; USA Councils;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Requirements Engineering, 2001. Proceedings. Fifth IEEE International Symposium on
  • Conference_Location
    Toronto, Ont.
  • Print_ISBN
    0-7695-1125-2
  • Type

    conf

  • DOI
    10.1109/ISRE.2001.948536
  • Filename
    948536