Projects per year
This method is complemented by an implementation of a change detection analysis for model-based security requirements. This system facilitates the agile security evaluation process to a high degree. However, the application of the proposed evaluation method is limited by several constraints. The authors discuss these constraints and show how traditional certification schemes could be extended to better support modern industrial software development processes.
|Number of pages||29|
|Journal||International Journal of Secure Software Engineering|
|Publication status||Published - 2015|
FingerprintDive into the research topics of 'Balancing Product and Process Assurance for Evolving Security Systems'. Together they form a unique fingerprint.
Pieber, T. W., Steger, C., Weiß, R., Ulz, T., Schachner, M., Kreiner, C. J., Plank, H., Troyer, M., Gressl, L. A., Seifert, C., Warmer, F., Rech, A., Erb, M., Scherr, F., Kammerer, M., Stelzer, P., Frewein, A., Strasser, A., Lindner, J., Ess, A., Feldbacher, M. & Weissteiner, H.
1/01/95 → …
Project: Research area
Steger, C., Zilli, M. & Raschke, W.
1/01/12 → 28/02/15
Project: Research project