identifying relevant threats.
To enhance the user experience with our tool, we
plan to add quick fixes that help users in correcting
errors in their models. Those quick fixes will be based
on the not yet completed set of validation conditions.
REFERENCES
Ansari, M. T. J., Pandey, D., and Alenezi, M. (2019).
STORE: security threat oriented requirements engi-
neering methodology. CoRR, abs/1901.01500.
Beckers, K. (2015). Pattern and Security Requirements
- Engineering-Based Establishment of Security Stan-
dards. Springer.
FIRST.org (2015). Common Vulnerability Scor-
ing System v3.0: Specification Document.
https://www.first.org/cvss/cvss-v30-specification-
v1.8.pdf.
Haley, C. B., Laney, R. C., Moffett, J. D., and Nuseibeh, B.
(2008). Security requirements engineering: A frame-
work for representation and analysis. IEEE Trans.
Software Eng., 34(1):133–153.
International Organization for Standardization (2018). ISO
31000:2018 Risk management – Principles and guide-
lines. Standard.
Jackson, M. A. (2000). Problem Frames - Analysing and
Structuring Software Development Problems. Pearson
Education.
Lin, L., Nuseibeh, B., Ince, D. C., Jackson, M., and Moffett,
J. D. (2003). Analysing security threats and vulnera-
bilities using abuse frames.
Lund, M. S., Solhaug, B., and Stølen, K. (2011).
Model-Driven Risk Analysis - The CORAS Approach.
Springer.
Meis, R. (2013). Problem-based consideration of privacy-
relevant domain knowledge. In Hansen, M., Hoep-
man, J., Leenes, R. E., and Whitehouse, D., editors,
Privacy and Identity Management for Emerging Ser-
vices and Technologies - 8th IFIP International Sum-
mer School, Nijmegen, The Netherlands, June 17-21,
2013, Revised Selected Papers, volume 421 of IFIP
Advances in Information and Communication Tech-
nology, pages 150–164. Springer.
Mohammadi, N. G., Alebrahim, A., Weyer, T., Heisel, M.,
and Pohl, K. (2013). A framework for combining
problem frames and goal models to support context
analysis during requirements engineering. In Cuz-
zocrea, A., Kittl, C., Simos, D. E., Weippl, E. R.,
and Xu, L., editors, 5th International Cross-Domain
Conference, CD-ARES 2013, Regensburg, Germany,
September 2-6, 2013. Proceedings, volume 8127 of
LNCS, pages 272–288. Springer.
Mouratidis, H. and Giorgini, P. (2007). Secure tropos: a
security-oriented extension of the tropos methodol-
ogy. International Journal of Software Engineering
and Knowledge Engineering, 17(2):285–309.
Shostack, A. (2014). Threat Modeling: Designing for Se-
curity. Wiley.
Sindre, G. and Opdahl, A. L. (2005). Eliciting security re-
quirements with misuse cases. Requir. Eng., 10(1).
Stevens, R., Votipka, D., Redmiles, E. M., Ahern, C.,
Sweeney, P., and Mazurek, M. L. (2018). The battle
for new york: A case study of applied digital threat
modeling at the enterprise level. In Enck, W. and
Felt, A. P., editors, 27th USENIX Security Symposium,
USENIX Security 2018, Baltimore, MD, USA, August
15-17, 2018., pages 621–637. USENIX Association.
van Lamsweerde, A. (2004). Elaborating security require-
ments by construction of intentional anti-models. In
Finkelstein, A., Estublier, J., and Rosenblum, D. S.,
editors, 26th International Conference on Software
Engineering (ICSE 2004), 23-28 May 2004, Edin-
burgh, United Kingdom, pages 148–157. IEEE Com-
puter Society.
van Lamsweerde, A. (2009). Requirements Engineering -
From System Goals to UML Models to Software Spec-
ifications. Wiley.
Wirtz, R. and Heisel, M. (2018). A systematic method to
describe and identify security threats based on func-
tional requirements. In Zemmari, A., Mosbah, M.,
Cuppens-Boulahia, N., and Cuppens, F., editors, Risks
and Security of Internet and Systems - 13th Interna-
tional Conference, CRiSIS 2018, Arcachon, France,
October 16-18, 2018, Revised Selected Papers, vol-
ume 11391 of LNCS, pages 205–221. Springer.
Wirtz, R. and Heisel, M. (2019). RE4DIST: model-
based elicitation of functional requirements for dis-
tributed systems. In van Sinderen, M. and Maciaszek,
L. A., editors, Proceedings of the 14th International
Conference on Software Technologies, ICSOFT 2019,
Prague, Czech Republic, July 26-28, 2019., pages 71–
81. SciTePress.
Wirtz, R., Heisel, M., Borchert, A., Meis, R., Omerovic, A.,
and Stølen, K. (2018). Risk-based elicitation of se-
curity requirements according to the ISO 27005 stan-
dard. In Damiani, E., Spanoudakis, G., and Maci-
aszek, L. A., editors, Evaluation of Novel Approaches
to Software Engineering - 13th International Con-
ference, ENASE 2018, Funchal, Madeira, Portugal,
March 23-24, 2018, Revised Selected Papers, volume
1023 of Communications in Computer and Informa-
tion Science, pages 71–97. Springer.
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
396