SeCMER: A tool to gain control of security requirements evolution

Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

This paper presents SeCMER, a tool for requirements evolution management developed in the context of the SecureChange project. The tool supports automatic detection of requirement changes and violation of security properties using change-driven transformations. The tool also supports argumentation analysis to check security properties are preserved by evolution and to identify new security properties that should be taken into account.

Original languageEnglish
Title of host publicationTowards a Service-Based Internet - 4th European Conference, ServiceWave 2011, Proceedings
Pages321-322
Number of pages2
DOIs
Publication statusPublished - Oct 19 2011
Event4th European Conference on Towards a Service-Based Internet, ServiceWave 2011 - Poznan, Poland
Duration: Oct 26 2011Oct 28 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6994 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th European Conference on Towards a Service-Based Internet, ServiceWave 2011
CountryPoland
CityPoznan
Period10/26/1110/28/11

Keywords

  • change impact analysis
  • secure i*
  • security argumentation
  • security patterns
  • security requirements engineering

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'SeCMER: A tool to gain control of security requirements evolution'. Together they form a unique fingerprint.

  • Cite this

    Bergmann, G., Massacci, F., Paci, F., Tun, T. T., Varró, D., & Yu, Y. (2011). SeCMER: A tool to gain control of security requirements evolution. In Towards a Service-Based Internet - 4th European Conference, ServiceWave 2011, Proceedings (pp. 321-322). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6994 LNCS). https://doi.org/10.1007/978-3-642-24755-2_35