Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Security requirements engineering (Record no. 559771)

MARC details
000 -LEADER
fixed length control field 02359 a2200217 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780262034210
040 ## - CATALOGING SOURCE
Transcribing agency IIT Kanpur
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.43
Item number D169s
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Dalpiaz, Fabiano
245 ## - TITLE STATEMENT
Title Security requirements engineering
Remainder of title designing secure socio–technical systems
Statement of responsibility, etc Fabiano Dalpiaz, Elda Paja and Paolo Giorgini
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher MIT Press
Year of publication 2016
Place of publication Cambridge
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxii, 201p
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE
Title MIT press information systems series / edited by Michael Papazoglou
520 ## - SUMMARY, ETC.
Summary, etc A novel, model-driven approach to security requirements engineering that focuses on socio-technical systems rather than merely technical systems. Security requirements engineering is especially challenging because designers must consider not just the software under design but also interactions among people, organizations, hardware, and software. Taking this broader perspective means designing a secure socio-technical system rather than a merely technical system. This book presents a novel, model-driven approach to designing secure socio-technical systems. It introduces the Socio-Technical Modeling Language (STS-ML) and presents a freely available software tool, STS-Tool, that supports this design approach through graphical modeling, automated reasoning capabilities to verify the models constructed, and the automatic derivation of security requirements documents. After an introduction to security requirements engineering and an overview of computer and information security, the book presents the STS-ML modeling language, introducing the modeling concepts used, explaining how to use STS-ML within the STS method for security requirements, and providing guidelines for the creation of models. The book then puts the STS approach into practice, introducing the STS-Tool and presenting two case studies from industry: an online collaborative platform and an e-Government system. Finally, the book considers other methods that can be used in conjunction with the STS method or that constitute an alternative to it. The book is suitable for course use or as a reference for practitioners. Exercises, review questions, and problems appear at the end of each chapter.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term System analysis -- Data processing
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Technology -- Social aspects
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Paja, Elda
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Giorgini, Paolo
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Date acquired Source of acquisition Cost, normal purchase price Full call number Accession Number Cost, replacement price Koha item type
        General Stacks PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 03/12/2018 58 2973.10 005.43 D169s A184014 3716.37 Books

Powered by Koha