skip to main content
10.1145/1810295.1810444acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
tutorial

Engineering safety- and security-related requirements for software-intensive systems: tutorial summary

Published: 01 May 2010 Publication History

Abstract

This full-day tutorial introduces the attendee to the engineering of safety- and security-related requirements for software-intensive systems. It provides a consistent, effective, and efficient method for identifying, analyzing, specifying, verifying, and validating the four different types of safety- and security-related requirements.

References

[1]
Donald Firesmith, Engineering Safety- and Security-Related Requirements for Software-Intensive Systems, Auerbach, 2011
[2]
Donald Firesmith, "Engineering Safety Requirements, Safety Constraints, and Safety-Critical Requirements," Journal of Object Technology, Vol. 3, No. 3, March/April 2004, pp. 27--42
[3]
Donald G. Firesmith, "Specifying Reusable Security Requirements," Journal of Object Technology, Vol. 3, No. 1, January -- February 2004, pp. 61--75
[4]
Donald Firesmith, "A Taxonomy of Safety-Related Requirements," Proceedings of the Third International Workshop on Requirements for High Assurance Systems (RHAS'04), Kyoto, Japan, 6--10 September 2004
[5]
Donald Firesmith, Common Concepts Underlying Safety, Security, and Survivability Engineering, Technical Note CMU/SEI-2003-TN-033, Software Engineering Institute, Pittsburgh, Pennsylvania, December 2003
[6]
Donald G. Firesmith, "Using Quality Models to Engineer Quality Requirements," Journal of Object Technology, Vol. 2, No. 5, September -- October 2003, pp. 67--75
[7]
Donald G. Firesmith, "Analyzing and Specifying Reusable Security Requirements," Proceedings of the Second International Workshop on Requirements for High Assurance Systems (RHAS'03) at the 11th International IEEE Conference on Requirements Engineering (RE'03), Monterey Bay, California, Software Engineering Institute, 8--12 September 2003, pp. 7--11
[8]
Donald G. Firesmith, "Security Use Cases," Journal of Object Technology, Vol. 2, No. 3, May -- June 2003, pp. 53--64
[9]
Donald G. Firesmith, "Engineering Security Requirements," Journal of Object Technology, Vol. 2, No. 1, January -- February 2003, pp. 53--68

Cited By

View all
  • (2017)A Survey of Approaches Reconciling between Safety and Security Requirements Engineering for Cyber-Physical SystemsJournal of Computer and Communications10.4236/jcc.2017.5100805:01(94-100)Online publication date: 2017
  • (2015)A web-based system for integrating safety techniques into requirements elicitation2015 9th Malaysian Software Engineering Conference (MySEC)10.1109/MySEC.2015.7475201(87-92)Online publication date: Dec-2015
  • (2014)A case study using a protocol to derive safety functional requirements from Fault Tree Analysis2014 IEEE 22nd International Requirements Engineering Conference (RE)10.1109/RE.2014.6912292(412-419)Online publication date: Aug-2014
  • Show More Cited By

Index Terms

  1. Engineering safety- and security-related requirements for software-intensive systems: tutorial summary

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICSE '10: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
    May 2010
    554 pages
    ISBN:9781605587196
    DOI:10.1145/1810295

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 May 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. requirements engineering
    2. safety engineering
    3. security engineering
    4. software-intensive systems

    Qualifiers

    • Tutorial

    Conference

    ICSE '10
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 276 of 1,856 submissions, 15%

    Upcoming Conference

    ICSE 2025

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)A Survey of Approaches Reconciling between Safety and Security Requirements Engineering for Cyber-Physical SystemsJournal of Computer and Communications10.4236/jcc.2017.5100805:01(94-100)Online publication date: 2017
    • (2015)A web-based system for integrating safety techniques into requirements elicitation2015 9th Malaysian Software Engineering Conference (MySEC)10.1109/MySEC.2015.7475201(87-92)Online publication date: Dec-2015
    • (2014)A case study using a protocol to derive safety functional requirements from Fault Tree Analysis2014 IEEE 22nd International Requirements Engineering Conference (RE)10.1109/RE.2014.6912292(412-419)Online publication date: Aug-2014
    • (2013)Vulnerability of the day: concrete demonstrations for software engineering undergraduatesProceedings of the 2013 International Conference on Software Engineering10.5555/2486788.2486948(1154-1157)Online publication date: 18-May-2013
    • (2013)Vulnerability of the Day: Concrete demonstrations for software engineering undergraduates2013 35th International Conference on Software Engineering (ICSE)10.1109/ICSE.2013.6606667(1154-1157)Online publication date: May-2013

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media