Specifying Reusable Security Requirements

By: Donald Firesmith


Unlike typical functional requirements, security requirements can potentially be highly reusable, especially if specified as instances of reusable templates. In his column, Donald Firesmith discusses the concepts underlying security engineering including its quality subfactors, and addresses the issue of security requirements and how they differ from the architectural mechanisms that will fulfill them.

Cite as:

Donald Firesmith, “Specifying Reusable Security Requirements”, Journal of Object Technology, Volume 3, no. 1 (January 2004), pp. 61-75, doi:10.5381/jot.2004.3.1.c6.

PDF | HTML | DOI | BiBTeX | Tweet this | Post to CiteULike | Share on LinkedIn

The JOT Journal   |   ISSN 1660-1769   |   DOI 10.5381/jot   |   AITO   |   Open Access   |    Contact