erise
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
erise [2013/04/08 11:34] – federica.paci@unitn.it | erise [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
===== eRISE Challenge ==== | ===== eRISE Challenge ==== | ||
- | The eRISE (engineering RIsks and SEcurity Requirements) challenge is a series of empirical studies that aim to compare security engineering methods sponsored by [[http:// | + | The eRISE (engineering RIsks and SEcurity Requirements) challenge is a series of empirical studies that aim to compare security engineering methods sponsored by [[http:// |
The idea of eRISE challenge is to bring together researchers, | The idea of eRISE challenge is to bring together researchers, | ||
- | With eRISE we want to be able to tell whether //it is not a method to find security recommendations..it helps us to represent the model but does not help in finding solution// or //it helps to find out specific security requirement// | + | With eRISE we want to be able to tell whether |
**eRISE provides | **eRISE provides | ||
Line 18: | Line 18: | ||
==== Research Questions ==== | ==== Research Questions ==== | ||
- | * **RQ1**// | + | * **RQ1** //Are security requirements and risk methods effective when applied by someone different than their own inventor?// |
* **RQ2** //Why are the methods effective? Why they are not?// | * **RQ2** //Why are the methods effective? Why they are not?// |
erise.1365413695.txt.gz · Last modified: (external edit)