User Tools

Site Tools


erise_2012

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
erise_2012 [2013/04/08 17:59]
katsiaryna.labunets@unitn.it [Evaluated Methods]
erise_2012 [2021/01/29 10:58] (current)
Line 2: Line 2:
 The eRISE 2012 challenge was conducted to empirically evaluate security engineering and risk analysis methods. The event was carried out in May and June 2012. The first part of experiment took place at the University of Trento, Italy, the second at Dauphine University, Paris, France.  ​ The eRISE 2012 challenge was conducted to empirically evaluate security engineering and risk analysis methods. The event was carried out in May and June 2012. The first part of experiment took place at the University of Trento, Italy, the second at Dauphine University, Paris, France.  ​
  
-To have a glimpse of eRISE 2012 you can look a video on YouTube [[http://​youtu.be/​hyxg56RTQsw|eRISE 2012]].+To have a glimpse of eRISE 2012 you can look a video on YouTube [[http://​youtu.be/​hyxg56RTQsw|eRISE 2012]]. See the [[validation_of_risk_and_security_requirements_methodologies|main page]] for our work on empirical validation of security risk assessment methods and other experiments.
 ==== Participants ==== ==== Participants ====
  {{ :​research_activities:​erise:​erise_2012:​photo:​training01.jpeg?​250|}}  {{ :​research_activities:​erise:​erise_2012:​photo:​training01.jpeg?​250|}}
 In eRISE 2012 were involved the following participants:​ In eRISE 2012 were involved the following participants:​
   * **Customers** ​   * **Customers** ​
-     * Marina Egea (Atos Research);​ +     ​* ​//Marina Egea// (Atos Research);​ 
-     * Jorge Cuellar (Siemens AG);+     ​* ​//Jorge Cuellar// (Siemens AG);
   * **Method Designers**:​   * **Method Designers**:​
-     * Le Minh Sang Tran - SINTEF/​University of Trento (CORAS) +     ​* ​//Le Minh Sang Tran// - SINTEF/​University of Trento (CORAS) 
-     * Kim Wuyts, Riccardo Scandariato - Katholieke Universiteit Leuven (LINDDUN) +     ​* ​//Kim Wuyts, Riccardo Scandariato// - Katholieke Universiteit Leuven (LINDDUN) 
-     * Thein Than Tun - Open University (Security Argumentation)  +     ​* ​//Thein Than Tun// - Open University (Security Argumentation)  
-     * Michalis Pavlidis - University of East London (Secure Tropos) +     ​* ​//Michalis Pavlidis// - University of East London (Secure Tropos) 
-     * Daniel G. Mellado - University of Castilla La Mancha (SREP)+     ​* ​//Daniel G. Mellado// - University of Castilla La Mancha (SREP)
   * **Observers**:​   * **Observers**:​
-     * Sarila Rana +     ​* ​//Sarila Rana// 
-     * Martina Degramatica +     ​* ​//Martina Degramatica// 
-     * Deepa Nagaraj +     ​* ​//Deepa Nagaraj// 
-     * Elda Paja +     ​* ​//Elda Paja// 
-     * Jennifer Horkoff+     ​* ​//Jennifer Horkoff//
   * **Participants**:​   * **Participants**:​
-     * 15 students were enrolled in the Master in Computer Science at the University of Trento and had a background in Security Engineering and Information Systems +     ​* ​//15 students// were enrolled in the Master in Computer Science at the University of Trento and had a background in Security Engineering and Information Systems 
-     * 27 professionals were attending a Master Course in Audit for Information System in Enterprises at Dauphine University. This master has an admission requirement of a minimum of five years of working experience in the field of Auditing in Information Systems+     ​* ​//27 professionals// were attending a Master Course in Audit for Information System in Enterprises at Dauphine University. This master has an admission requirement of a minimum of five years of working experience in the field of Auditing in Information Systems
  
 ==== Evaluated Methods ==== ==== Evaluated Methods ====
Line 58: Line 58:
 {{ :​research_activities:​erise:​erise_2012:​photo:​application_01.jpeg?​250|}} {{ :​research_activities:​erise:​erise_2012:​photo:​application_01.jpeg?​250|}}
   * **Training Phase** where participants attended tutorials on the methods under evaluation and on the eHealth and Smart Grid industrial cases: ​   * **Training Phase** where participants attended tutorials on the methods under evaluation and on the eHealth and Smart Grid industrial cases: ​
-     - May 7-9, 2012 at the University of Trento, ​Trento, Italy +     - May 7-9, 2012 at the University of Trento, Italy 
   * **Application Phases**, where participants applied the methods to analyse security issues of the eHealth and Smart Grid industrial cases:   * **Application Phases**, where participants applied the methods to analyse security issues of the eHealth and Smart Grid industrial cases:
-     - May 10-11, 2012 at the University of Trento, ​Trento, Italy+     - May 10-11, 2012 at the University of Trento, Italy
      - June 14-15, 2012 at Dauphine University, Paris, France      - June 14-15, 2012 at Dauphine University, Paris, France
   * **Evaluation Phase**, where participants evaluated the methods through focused group interviews and post-it notes sessions while method designers and customers evaluated the final reports. The goal is to assess the correctness of the methods application and the quality of the security requirements identified by the participants.   * **Evaluation Phase**, where participants evaluated the methods through focused group interviews and post-it notes sessions while method designers and customers evaluated the final reports. The goal is to assess the correctness of the methods application and the quality of the security requirements identified by the participants.
erise_2012.1365436775.txt.gz · Last modified: 2021/01/29 10:58 (external edit)