Articles with "reusable security" as a keyword



Photo by scottwebb from unsplash

Reusable Security Requirements Repository Implementation Based on Application/System Components

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3133020

Abstract: Forming high quality requirements has a direct impact on project success. Gathering security requirements could be challenging, since it demands a multidisciplinary approach and security expertise. Security requirements repository enables an effective alternative for addressing… read more here.

Keywords: implementation based; repository implementation; security; reusable security ... See more keywords