A Research Agenda for Security Engineering

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Compositionality of Security Protocols: A Research Agenda

The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the verification of security protocols have been developed. However, their applicability is limited to relatively small protocols that run in isolation. Many of the protocols that are in use today cannot be verified using the...

متن کامل

Requirements engineering: a review and research agenda

This paper reviews the area of requirements engineering. It outlines the key concerns to which attention should be devoted by both practitioners, who wish to "reengineer" their development processes, and academics, seeking intellectual challenges. It presents an assessment of the state-of-the-art and draws conclusions in the form of a research agenda.

متن کامل

Context Engineering: An IS Development Research Agenda

The authors present the Context Engineering (CE) approach to Information Systems Development (ISD) as a framework to organise ideas about previous development experience and to guide future research on specific ISD methods and techniques. The goals of the CE approach are: to achieve an understanding of the ISD as socio-technical phenomena within a cultural and historical envelope; to provide a ...

متن کامل

Shaping the Research Agenda for Security in E-Commerce

In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applications generally go beyond the more traditional requirements of network security. This is particularly true for the requirements that address the complexity and availability of cryptographic applications, the anonymity o...

متن کامل

Information Security in the Extended Enterprise: A Research Agenda

Today most companies are closely knit together with and thus dependent on suppliers, allies, customers, and public authorities. Member companies in such an extended enterprise or “business network” are either forced or volunteer to meet certain security objectives as a whole. As a consequence, the business network needs to agree on a common strategy, joint processes and technical interfaces to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Technology Innovation Management Review

سال: 2013

ISSN: 1927-0321

DOI: 10.22215/timreview715