A Research Agenda for Security Engineering
نویسندگان
چکیده
منابع مشابه
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the verification of security protocols have been developed. However, their applicability is limited to relatively small protocols that run in isolation. Many of the protocols that are in use today cannot be verified using the...
متن کاملRequirements engineering: a review and research agenda
This paper reviews the area of requirements engineering. It outlines the key concerns to which attention should be devoted by both practitioners, who wish to "reengineer" their development processes, and academics, seeking intellectual challenges. It presents an assessment of the state-of-the-art and draws conclusions in the form of a research agenda.
متن کاملContext Engineering: An IS Development Research Agenda
The authors present the Context Engineering (CE) approach to Information Systems Development (ISD) as a framework to organise ideas about previous development experience and to guide future research on specific ISD methods and techniques. The goals of the CE approach are: to achieve an understanding of the ISD as socio-technical phenomena within a cultural and historical envelope; to provide a ...
متن کاملShaping the Research Agenda for Security in E-Commerce
In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applications generally go beyond the more traditional requirements of network security. This is particularly true for the requirements that address the complexity and availability of cryptographic applications, the anonymity o...
متن کاملInformation Security in the Extended Enterprise: A Research Agenda
Today most companies are closely knit together with and thus dependent on suppliers, allies, customers, and public authorities. Member companies in such an extended enterprise or “business network” are either forced or volunteer to meet certain security objectives as a whole. As a consequence, the business network needs to agree on a common strategy, joint processes and technical interfaces to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Technology Innovation Management Review
سال: 2013
ISSN: 1927-0321
DOI: 10.22215/timreview715