Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2840322
Abstract: The focus on secure software development has been growing steadily in all phases of the software development life cycle. Security awareness in the requirements engineering stage of software development is important in building secure software.…
read more here.
Keywords:
security requirements;
security;
readiness;
requirements engineering ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3133020
Abstract: Forming high quality requirements has a direct impact on project success. Gathering security requirements could be challenging, since it demands a multidisciplinary approach and security expertise. Security requirements repository enables an effective alternative for addressing…
read more here.
Keywords:
implementation based;
repository implementation;
security;
reusable security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Computational Social Systems"
DOI: 10.1109/tcss.2020.3047382
Abstract: Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data has been accommodated well…
read more here.
Keywords:
fog nodes;
task;
privacy;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2020.3012729
Abstract: Separations of Duties (SoDs) are an important class of security requirements in business process management. Their violation may result in system misuse and fraud, leading to economic losses or legal implications. Hence, it is of…
read more here.
Keywords:
business;
requirements business;
dynamic implementation;
security requirements ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2021.3103109
Abstract: Security analysts rely on scenarios to assess vulnerabilities, project attacks, and decide on security requirements that mitigate the threat. However, eliciting natural language scenarios from stakeholders can be an ad-hoc process and subject to ambiguity…
read more here.
Keywords:
security requirements;
natural language;
scenario elicitation;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v15.i3.pp1578-1585
Abstract: Software requirements with its functional and non-functional methods are the first important phase in producing a software system with free errors. The functional requirements are the visual actions that may easily evaluated from the developer…
read more here.
Keywords:
system;
intelligent model;
security requirements;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "BMC Medical Informatics and Decision Making"
DOI: 10.1186/s12911-020-01209-8
Abstract: Background Today’s healthcare organizations want to implement secure and quality healthcare software as cyber-security is a significant risk factor for healthcare data. Considering security requirements during trustworthy healthcare software development process is an essential part…
read more here.
Keywords:
security requirements;
security;
development;
healthcare ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Applied Sciences"
DOI: 10.3390/app10144981
Abstract: With recent advancements of technologies such as Internet of Things and cloud computing, security of information systems has emerged as a critical issue. This has created a need for elicitation and analysis of the security…
read more here.
Keywords:
security requirements;
information;
framework;
security ... See more keywords