DocumentCode :
3460127
Title :
The hidden meta-requirements of security and privacy
Author :
Spafford, Gene
Author_Institution :
CERIAS, Purdue Univ., West Lafayette, IN, USA
fYear :
2001
fDate :
2001
Firstpage :
10
Abstract :
When collecting requirements for software, designers may learn of needs for specific forms of protection to be present. These needs may be translated into requirements for encryption or authentication, but what about the non-obvious aspects of security - including privacy, auditability and assurance - that are usually overlooked in the requirements capture process? When we overlook these issues, we get software that doesn´t deserve our trust. In this paper, I discuss some of the aspects of security that are regularly overlooked by designers and suggest some standard questions that should be addressed in every design
Keywords :
auditing; data privacy; security of data; software quality; systems analysis; auditability; authentication; encryption; hidden meta-requirements; privacy; security; software design; software protection; software quality assurance; software requirements capture; software trustworthiness; Authentication; Computer science education; Computer security; Cryptography; Information security; Military computing; Privacy; Protection; Software design; USA Councils;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Requirements Engineering, 2001. Proceedings. Fifth IEEE International Symposium on
Conference_Location :
Toronto, Ont.
Print_ISBN :
0-7695-1125-2
Type :
conf
DOI :
10.1109/ISRE.2001.948536
Filename :
948536
Link To Document :
بازگشت