erise_2011
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
erise_2011 [2013/04/09 20:07] – [Application scenario] katsiaryna.labunets@unitn.it | erise_2011 [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 2: | Line 2: | ||
The eRISE challenge 2011 was conducted for empirical evaluation of security engineering methods. The event was carried out in May 2011. Both parts of experiment, training and application phases, took place at Dauphine University, Paris, France. | The eRISE challenge 2011 was conducted for empirical evaluation of security engineering methods. The event was carried out in May 2011. Both parts of experiment, training and application phases, took place at Dauphine University, Paris, France. | ||
- | You can look a video of eRISE 2011 presentation on [[http:// | + | You can look a video of eRISE 2011 presentation on [[http:// |
==== Participants ==== | ==== Participants ==== | ||
In eRISE 2011 were involved the following participants: | In eRISE 2011 were involved the following participants: | ||
* **Customers** | * **Customers** | ||
- | * Yudistira Asnar (University of Trento) | + | |
- | * Federica Paci (University of Trento) | + | |
* **Method Designers**: | * **Method Designers**: | ||
- | * Atle Refsdal - SINTEF (CORAS) | + | |
- | * Thein Than Tun - Open University (Security Argumentation) | + | |
- | * Michalis Pavlidis, Shareeful Islam - University of East London (Secure Tropos) | + | |
- | * Fabio Massacci - University of Trento (Si*) | + | |
* **Participants**: | * **Participants**: | ||
- | * 13 students were enrolled in the Master in Computer Science at the University of Trento; | + | |
- | * 36 professionals were attending a Master Course in Management of Information System Enterprise at Dauphine University. This master has an admission requirement of a minimum of five years of working experience in the field of Auditing in Information Systems | + | |
==== Evaluated Methods ==== | ==== Evaluated Methods ==== | ||
The selection of the security requirements methods to be evaluated was driven | The selection of the security requirements methods to be evaluated was driven |
erise_2011.1365530875.txt.gz · Last modified: (external edit)