This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
erise_2012 [2013/04/08 17:59] katsiaryna.labunets@unitn.it [Participants] |
erise_2012 [2013/04/09 20:16] katsiaryna.labunets@unitn.it [Participants] |
||
---|---|---|---|
Line 7: | Line 7: | ||
In eRISE 2012 were involved the following participants: | In eRISE 2012 were involved the following participants: | ||
* **Customers** | * **Customers** | ||
- | * Marina Egea (Atos Research); | + | * //Marina Egea// (Atos Research); |
- | * Jorge Cuellar (Siemens AG); | + | * //Jorge Cuellar// (Siemens AG); |
* **Method Designers**: | * **Method Designers**: | ||
- | * Le Minh Sang Tran - SINTEF/University of Trento (CORAS) | + | * //Le Minh Sang Tran// - SINTEF/University of Trento (CORAS) |
- | * Kim Wuyts, Riccardo Scandariato - Katholieke Universiteit Leuven (LINDDUN) | + | * //Kim Wuyts, Riccardo Scandariato// - Katholieke Universiteit Leuven (LINDDUN) |
- | * Thein Than Tun - Open University (Security Argumentation) | + | * //Thein Than Tun// - Open University (Security Argumentation) |
- | * Michalis Pavlidis - University of East London (Secure Tropos) | + | * //Michalis Pavlidis// - University of East London (Secure Tropos) |
- | * Daniel G. Mellado - University of Castilla La Mancha (SREP) | + | * //Daniel G. Mellado// - University of Castilla La Mancha (SREP) |
* **Observers**: | * **Observers**: | ||
- | * Sarila Rana | + | * //Sarila Rana// |
- | * Martina Degramatica | + | * //Martina Degramatica// |
- | * Deepa Nagaraj | + | * //Deepa Nagaraj// |
- | * Elda Paja | + | * //Elda Paja// |
- | * Jennifer Horkoff | + | * //Jennifer Horkoff// |
* **Participants**: | * **Participants**: | ||
- | * 15 students were enrolled in the Master in Computer Science at the University of Trento and had a background in Security Engineering and Information Systems | + | * //15 students// were enrolled in the Master in Computer Science at the University of Trento and had a background in Security Engineering and Information Systems |
- | * 27 professionals were attending a Master Course in Audit for Information System in Enterprises at Dauphine University. This master has an admission requirement of a minimum of five years of working experience in the field of Auditing in Information Systems | + | * //27 professionals// were attending a Master Course in Audit for Information System in Enterprises at Dauphine University. This master has an admission requirement of a minimum of five years of working experience in the field of Auditing in Information Systems |
==== Evaluated Methods ==== | ==== Evaluated Methods ==== | ||
- | {{ :research_activities:erise:erise_2012:photo:training.jpeg?200|}} | + | {{ :research_activities:erise:erise_2012:photo:training.jpeg?250|}} |
The selection of the security requirements methods to be evaluated was driven | The selection of the security requirements methods to be evaluated was driven | ||
by three main factors: the number of citations, the fact that research on the | by three main factors: the number of citations, the fact that research on the |