Skip to main content
  • 680 Accesses

Abstract

This chapter presents a process framework for specifying usable and secure systems. Building on the meta-model described in Chap. 3, I describe the different perspectives of IRIS, and their make up, propose a number of exemplar techniques for each perspective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nuseibeh B. Weaving together requirements and architectures. Computer. 2001;34(3):115–7.

    Google Scholar 

  2. “Technique, 3” OED Online. Oxford University Press; 2010. http://dictionary.oed.com/cgi/entry/50248085.

  3. Corbin JM, Strauss AL. Basics of qualitative research: techniques and procedures for developing grounded theory. 3rd ed. Sage Publications, Inc.; 2008.

    Google Scholar 

  4. Fléchais I. designing secure and usable systems. University College London; 2005.

    Google Scholar 

  5. Dupree JLW, Lank E, Berry DM. A case study of using grounded analysis as a requirement engineering method: Identifying personas that specify privacy and security tool users. Sci Comput Program. 2018;152:1–37.

    Google Scholar 

  6. Muhr T. User’s manual for ATLAS.ti 5.0. Berlin; 2004.

    Google Scholar 

  7. Pruitt J, Adlin T. The persona lifecycle: keeping people in mind throughout product design. Boston: Elsevier; 2006.

    Google Scholar 

  8. Friedman B, Lin P, Miller JK. Informed consent by design. In: Cranor LF, Garfinkel S, editors. Security and usability: designing secure systems that people can use. O’Reilly Media; 2005.

    Google Scholar 

  9. Rosson MB, Carroll JM. Usability engineering: scenario-based development of human-computer interaction. London: Academic Press; 2002.

    Google Scholar 

  10. Rosson MB, Carroll JM. Scenario-based design. In: Sears A, Jacko JA, editors. The human-computer interaction handbook: fundamentals, evolving technologies, and emerging applications. 2nd ed. Boca Raton: CRC Press; 2008. p. 1041–1060.

    Google Scholar 

  11. Checkland P, Scholes J. Soft systems methodology in action. New York: Wiley; 1990.

    Google Scholar 

  12. Alexander I, Beus-Dukic L. Discovering requirements: how to specify products and services. New York: Wiley; 2009.

    Google Scholar 

  13. Jackson M. Problem frames: analysing and structuring software development problems. New York: Addison-Wesley; 2001.

    Google Scholar 

  14. Robertson J, Robertson S. Volere requirements specification template: edition 14 - January 2009; 2009. http://www.volere.co.uk/template.htm.

  15. van Lamsweerde A. Requirements engineering: from system goals to UML models to software specifications. New York: Wiley; 2009.

    Google Scholar 

  16. Robertson S, Robertson J. Mastering the requirements process. 2nd ed. Cambridge: Addison-Wesley; 2006.

    Google Scholar 

  17. Fairclough J, Jones M, Mortensen U, Melton B, Scheffer A, de Pablo D, et al. ESA software engineering standards and ISO 9001: theory and practice. Eur Space Agency (Special Publication) ESA SP. 1996;377:303–308.

    Google Scholar 

  18. IEEE. IEEE recommended practice for software requirements specifications. IEEE Std 830–1998. 1998 Oct.

    Google Scholar 

  19. den Braber F, Hogganvik I, Lund MS, Stølen K, Vraalsen F. Model-based security analysis in seven steps - a guided tour to the CORAS method. BT Technol J. 2007;25(1):101–17.

    Google Scholar 

  20. Mayer N. Model-based Management of Information System Security Risk. University of Namur; 2009.

    Google Scholar 

  21. Alexander I. Negative scenarios and misuse cases. In: Alexander IF, Maiden N, editors. Scenarios. Stories, use cases: through the systems development life-cycle. New York: Wiley; 2004.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shamal Faily .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Faily, S. (2018). The IRIS Framework. In: Designing Usable and Secure Software with IRIS and CAIRIS. Springer, Cham. https://doi.org/10.1007/978-3-319-75493-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75493-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75492-5

  • Online ISBN: 978-3-319-75493-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics