erise
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
erise [2013/04/05 18:34] – [Research Question] federica.paci@unitn.it | erise [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ===== Engineering of Risk and Security Requirement | + | ===== eRISE Challenge ==== |
- | The eRISE challenge is a series of empirical studies that aim to compare security engineering methods sponsored by [[http:// | + | The eRISE (engineering RIsks and SEcurity Requirements) |
The idea of eRISE challenge is to bring together researchers, | The idea of eRISE challenge is to bring together researchers, | ||
- | With eRISE we want to be able to tell whether //it is not a method to find security recommendations..it helps us to represent the model but does not help in finding solution// or //it helps to find out specific security requirement// | + | With eRISE we want to be able to tell whether |
**eRISE provides | **eRISE provides | ||
- | * Empirical evaluation and Benchmarking | + | * Empirical evaluation and benchmarking |
- | * Knowledge of how and why participants intend to adopt a method; | + | * Understand if the proposed |
- | * Feedback to improve a security method by investigating strengths, weakness and | + | * Feedback to improve a security method by investigating |
**eRISE aims to provide the participants with the benefit of:** | **eRISE aims to provide the participants with the benefit of:** | ||
* Knowledge about various state-of-the art methods in the research field, on analyzing security risks and requirements of a system; | * Knowledge about various state-of-the art methods in the research field, on analyzing security risks and requirements of a system; | ||
- | * Opportunity to participate and work on an international collaborative project | + | * Opportunity to participate and work in international collaborative project. |
==== Research Questions ==== | ==== Research Questions ==== | ||
- | * **RQ1**// | + | * **RQ1** //Are security requirements and risk methods effective when applied by someone different than their own inventor?// |
* **RQ2** //Why are the methods effective? Why they are not?// | * **RQ2** //Why are the methods effective? Why they are not?// |
erise.1365179658.txt.gz · Last modified: (external edit)