Search Results - "Tondel, Inger Anne"
-
1
Continuous software security through security prioritisation meetings
Published in The Journal of systems and software (01-12-2022)“…Software security needs to be a continuous endeavour in current software development practices. Frequent software updates, paired with an ongoing flow of…”
Get full text
Journal Article -
2
Security Incident Information Exchange for Cloud Service Provisioning Chains
Published in Cryptography (01-12-2018)“…Online services are increasingly becoming a composition of different cloud services, making incident-handling difficult, as Cloud Service Providers (CSPs) with…”
Get full text
Journal Article -
3
Influencing the security prioritisation of an agile software development project
Published in Computers & security (01-07-2022)“…Software security is a complex topic, and for development projects it can be challenging to assess what security is necessary and cost-effective. Agile…”
Get full text
Journal Article -
4
Accountability Requirements in the Cloud Provider Chain
Published in Symmetry (Basel) (01-04-2018)“…In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider…”
Get full text
Journal Article -
5
Information security incident management: Current practice as reported in the literature
Published in Computers & security (01-09-2014)“…This paper reports results of a systematic literature review on current practice and experiences with incident management, covering a wide variety of…”
Get full text
Journal Article -
6
Improving smart grid security through 5G enabled IoT and edge computing
Published in Concurrency and computation (25-09-2021)“…This article investigates and analyzes the security aspects of 5G specifications from the perspective of IoT‐based smart grids. As the smart grid requires…”
Get full text
Journal Article -
7
A framework for incident response management in the petroleum industry
Published in International journal of critical infrastructure protection (01-05-2009)“…Incident response is the process of responding to and handling security-related incidents involving information and communications technology (ICT)…”
Get full text
Journal Article -
8
Personal health information on display: balancing needs, usability and legislative requirements
Published in Studies in health technology and informatics (2011)“…Large wall-mounted screens placed at locations where health personnel pass by will assist in self-coordination and improve utilisation of both resources and…”
Get more information
Journal Article -
9
Interdependencies and reliability in the combined ICT and power system: An overview of current research
Published in Applied computing & informatics (01-01-2018)“…The smart grid vision implies extensive use of ICT in the power system, enabling increased flexibility and functionality and thereby meeting future demands and…”
Get full text
Journal Article -
10
Hunting Dependencies: Using Bow-Tie for Combined Analysis of Power and Cyber Security
Published in 2020 2nd International Conference on Societal Automation (SA) (26-05-2021)“…Modern electric power systems are complex cyber-physical systems. The integration of traditional power and digital technologies result in interdependencies…”
Get full text
Conference Proceeding -
11
The Quality Triage Method: Quickly Identifying User Stories with Quality Risks
Published in 2020 2nd International Conference on Societal Automation (SA) (26-05-2021)“…Quality requirements often receive insufficient attention, both in agile and in traditional software development. This paper describes the quality triage, a…”
Get full text
Conference Proceeding -
12
How Much Cloud Can You Handle?
Published in 2015 10th International Conference on Availability, Reliability and Security (01-08-2015)“…Outsourcing computing and storage to the cloud does not eliminate the need for handling of information security incidents. However, the long provider chains…”
Get full text
Conference Proceeding -
13
Forewarned is Forearmed: Indicators for Evaluating Information Security Incident Management
Published in 2013 Seventh International Conference on IT Security Incident Management and IT Forensics (01-03-2013)“…This paper presents a method for evaluating an organization's ability to manage security incidents. The method is based on resilient thinking, and describes…”
Get full text
Conference Proceeding -
14
Cyber security challenges in Smart Grids
Published in 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies (01-12-2011)“…The introduction of telecommunication in the energy grid, leading the way towards Smart Grids, challenges the way safe operations have traditionally been…”
Get full text
Conference Proceeding -
15
Combining Misuse Cases with Attack Trees and Security Activity Models
Published in 2010 International Conference on Availability, Reliability and Security (01-02-2010)“…Misuse cases and attack trees have been suggested for security requirements elicitation and threat modeling in software projects. Their use is believed to…”
Get full text
Conference Proceeding -
16
Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects
Published in 2018 25th Australasian Software Engineering Conference (ASWEC) (01-11-2018)“…The goal of secure software engineering is to create software that keeps performing as intended even when exposed to attacks. Threat modeling is considered to…”
Get full text
Conference Proceeding -
17
Security Requirements for the Rest of Us: A Survey
Published in IEEE software (01-01-2008)“…Most software developers aren't primarily interested in security. For decades, the focus has been on implementing as much functionality as possible before the…”
Get full text
Journal Article -
18
Covering Your Assets in Software Engineering
Published in 2008 Third International Conference on Availability, Reliability and Security (01-03-2008)“…Many security requirements elicitation techniques implicitly assume that assets are identified on beforehand, but few actually describe how this should be…”
Get full text
Conference Proceeding -
19
Design and Implementation of a CBR-based Privacy Agent
Published in 2012 Seventh International Conference on Availability, Reliability and Security (01-08-2012)“…This paper presents Privacy Advisor; a software which uses machine-learning techniques to help the users make online privacy decisions. Privacy Advisor is…”
Get full text
Conference Proceeding -
20
An Architectural Foundation for Security Model Sharing and Reuse
Published in 2009 International Conference on Availability, Reliability and Security (01-03-2009)“…Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of…”
Get full text
Conference Proceeding