User Tools

Site Tools


erise_2012

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
erise_2012 [2013/04/09 20:16]
katsiaryna.labunets@unitn.it [Participants]
erise_2012 [2013/04/18 16:40]
katsiaryna.labunets@unitn.it [Evaluated Methods]
Line 35: Line 35:
  
   * **CORAS** is a model-driven method for risk analysis proposed by SINTEF, Norway. Materials: {{:​research_activities:​erise:​erise_2012:​tutorials:​coras-intro.pdf|book chapter}}, {{:​research_activities:​erise:​erise_2012:​tutorials:​erise2012-coras.pptx|tutorial}}.   * **CORAS** is a model-driven method for risk analysis proposed by SINTEF, Norway. Materials: {{:​research_activities:​erise:​erise_2012:​tutorials:​coras-intro.pdf|book chapter}}, {{:​research_activities:​erise:​erise_2012:​tutorials:​erise2012-coras.pptx|tutorial}}.
-  * **LINDDUN** is a methodology to elicit the privacy requirements of software-intensive systems and select privacy enhancing technologies designed by Distrinet Research Group at Katholieke Universiteit Leuven, Belgium. Materials: {{:​research_activities:​erise:​erise_2012:​tutorials:​linddun-paper.pdf|paper}},​ {{:​research_activities:​erise:​erise_2012:​tutorials:​linddun_casestudy_example.pdf|case study}}, {{:​research_activities:​erise:​erise_2012:​tutorials:​erise2012_linddun.pdf|tutorial}}.+  * **LINDDUN** is a methodology to elicit the privacy requirements of software-intensive systems and select privacy enhancing technologies designed by Distrinet Research Group at Katholieke Universiteit Leuven, Belgium. Materials: {{:​research_activities:​erise:​erise_2012:​tutorials:​linddun-paper.pdf|paper}},​ {{:​research_activities:​erise:​erise_2012:​tutorials:​linddun_casestudy_example.pdf|case study}}, {{:​research_activities:​erise:​erise_2012:​tutorials:​erise2012_linddun.pdf|presentaion}}.
   * **SECURITY ARGUMENTATION** is a framework for security requirements elicitation and analysis developed at Open University, Buckinghamshire,​ United Kingdom. Materials: {{:​research_activities:​erise:​erise_2012:​tutorials:​secarg-paper.pdf|paper}},​ {{:​research_activities:​erise:​erise_2012:​tutorials:​secarg-pres.pptx|tutorial}}.   * **SECURITY ARGUMENTATION** is a framework for security requirements elicitation and analysis developed at Open University, Buckinghamshire,​ United Kingdom. Materials: {{:​research_activities:​erise:​erise_2012:​tutorials:​secarg-paper.pdf|paper}},​ {{:​research_activities:​erise:​erise_2012:​tutorials:​secarg-pres.pptx|tutorial}}.
   * **SECURE TROPOS** is a methodology designed at University of East London, United Kingdom; the methodology supports capturing, analysis and reasoning of security requirements from the early stages of the development process. Materials: {{:​research_activities:​erise:​erise_2012:​tutorials:​secure_tropos-umlsec-paper.pdf|paper}},​ {{:​research_activities:​erise:​erise_2012:​tutorials:​secure_tropos-paper.pdf|paper}},​ {{:​research_activities:​erise:​erise_2012:​tutorials:​secure_tropos-pres.pptx|tutorial}}.   * **SECURE TROPOS** is a methodology designed at University of East London, United Kingdom; the methodology supports capturing, analysis and reasoning of security requirements from the early stages of the development process. Materials: {{:​research_activities:​erise:​erise_2012:​tutorials:​secure_tropos-umlsec-paper.pdf|paper}},​ {{:​research_activities:​erise:​erise_2012:​tutorials:​secure_tropos-paper.pdf|paper}},​ {{:​research_activities:​erise:​erise_2012:​tutorials:​secure_tropos-pres.pptx|tutorial}}.
Line 58: Line 58:
 {{ :​research_activities:​erise:​erise_2012:​photo:​application_01.jpeg?​250|}} {{ :​research_activities:​erise:​erise_2012:​photo:​application_01.jpeg?​250|}}
   * **Training Phase** where participants attended tutorials on the methods under evaluation and on the eHealth and Smart Grid industrial cases: ​   * **Training Phase** where participants attended tutorials on the methods under evaluation and on the eHealth and Smart Grid industrial cases: ​
-     - May 7-9, 2012 at the University of Trento, ​Trento, Italy +     - May 7-9, 2012 at the University of Trento, Italy 
   * **Application Phases**, where participants applied the methods to analyse security issues of the eHealth and Smart Grid industrial cases:   * **Application Phases**, where participants applied the methods to analyse security issues of the eHealth and Smart Grid industrial cases:
-     - May 10-11, 2012 at the University of Trento, ​Trento, Italy+     - May 10-11, 2012 at the University of Trento, Italy
      - June 14-15, 2012 at Dauphine University, Paris, France      - June 14-15, 2012 at Dauphine University, Paris, France
   * **Evaluation Phase**, where participants evaluated the methods through focused group interviews and post-it notes sessions while method designers and customers evaluated the final reports. The goal is to assess the correctness of the methods application and the quality of the security requirements identified by the participants.   * **Evaluation Phase**, where participants evaluated the methods through focused group interviews and post-it notes sessions while method designers and customers evaluated the final reports. The goal is to assess the correctness of the methods application and the quality of the security requirements identified by the participants.
erise_2012.txt ยท Last modified: 2021/01/29 10:58 (external edit)