This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
erise_2012 [2013/04/18 16:40] katsiaryna.labunets@unitn.it [Evaluated Methods] |
erise_2012 [2013/04/18 16:41] katsiaryna.labunets@unitn.it [Evaluated Methods] |
||
---|---|---|---|
Line 35: | Line 35: | ||
* **CORAS** is a model-driven method for risk analysis proposed by SINTEF, Norway. Materials: {{:research_activities:erise:erise_2012:tutorials:coras-intro.pdf|book chapter}}, {{:research_activities:erise:erise_2012:tutorials:erise2012-coras.pptx|tutorial}}. | * **CORAS** is a model-driven method for risk analysis proposed by SINTEF, Norway. Materials: {{:research_activities:erise:erise_2012:tutorials:coras-intro.pdf|book chapter}}, {{:research_activities:erise:erise_2012:tutorials:erise2012-coras.pptx|tutorial}}. | ||
- | * **LINDDUN** is a methodology to elicit the privacy requirements of software-intensive systems and select privacy enhancing technologies designed by Distrinet Research Group at Katholieke Universiteit Leuven, Belgium. Materials: {{:research_activities:erise:erise_2012:tutorials:linddun-paper.pdf|paper}}, {{:research_activities:erise:erise_2012:tutorials:linddun_casestudy_example.pdf|case study}}, {{:research_activities:erise:erise_2012:tutorials:erise2012_linddun.pdf|presentaion}}. | + | * **LINDDUN** is a methodology to elicit the privacy requirements of software-intensive systems and select privacy enhancing technologies designed by Distrinet Research Group at Katholieke Universiteit Leuven, Belgium. Materials: {{:research_activities:erise:erise_2012:tutorials:linddun-paper.pdf|paper}}, {{:research_activities:erise:erise_2012:tutorials:linddun_casestudy_example.pdf|case study}}, {{:research_activities:erise:erise_2012:tutorials:erise2012_linddun.pdf|tutorial}}. |
* **SECURITY ARGUMENTATION** is a framework for security requirements elicitation and analysis developed at Open University, Buckinghamshire, United Kingdom. Materials: {{:research_activities:erise:erise_2012:tutorials:secarg-paper.pdf|paper}}, {{:research_activities:erise:erise_2012:tutorials:secarg-pres.pptx|tutorial}}. | * **SECURITY ARGUMENTATION** is a framework for security requirements elicitation and analysis developed at Open University, Buckinghamshire, United Kingdom. Materials: {{:research_activities:erise:erise_2012:tutorials:secarg-paper.pdf|paper}}, {{:research_activities:erise:erise_2012:tutorials:secarg-pres.pptx|tutorial}}. | ||
* **SECURE TROPOS** is a methodology designed at University of East London, United Kingdom; the methodology supports capturing, analysis and reasoning of security requirements from the early stages of the development process. Materials: {{:research_activities:erise:erise_2012:tutorials:secure_tropos-umlsec-paper.pdf|paper}}, {{:research_activities:erise:erise_2012:tutorials:secure_tropos-paper.pdf|paper}}, {{:research_activities:erise:erise_2012:tutorials:secure_tropos-pres.pptx|tutorial}}. | * **SECURE TROPOS** is a methodology designed at University of East London, United Kingdom; the methodology supports capturing, analysis and reasoning of security requirements from the early stages of the development process. Materials: {{:research_activities:erise:erise_2012:tutorials:secure_tropos-umlsec-paper.pdf|paper}}, {{:research_activities:erise:erise_2012:tutorials:secure_tropos-paper.pdf|paper}}, {{:research_activities:erise:erise_2012:tutorials:secure_tropos-pres.pptx|tutorial}}. |