Articles with "security requirements" as a keyword



Photo from wikipedia

A Readiness Model for Security Requirements Engineering

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2840322

Abstract: The focus on secure software development has been growing steadily in all phases of the software development life cycle. Security awareness in the requirements engineering stage of software development is important in building secure software.… read more here.

Keywords: security requirements; security; readiness; requirements engineering ... See more keywords
Photo by scottwebb from unsplash

Reusable Security Requirements Repository Implementation Based on Application/System Components

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3133020

Abstract: Forming high quality requirements has a direct impact on project success. Gathering security requirements could be challenging, since it demands a multidisciplinary approach and security expertise. Security requirements repository enables an effective alternative for addressing… read more here.

Keywords: implementation based; repository implementation; security; reusable security ... See more keywords
Photo by anniespratt from unsplash

Privacy-Aware Collaborative Task Offloading in Fog Computing

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computational Social Systems"

DOI: 10.1109/tcss.2020.3047382

Abstract: Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data has been accommodated well… read more here.

Keywords: fog nodes; task; privacy; security ... See more keywords
Photo by andrewtneel from unsplash

Dynamic Implementation of Security Requirements in Business Processes

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2020.3012729

Abstract: Separations of Duties (SoDs) are an important class of security requirements in business process management. Their violation may result in system misuse and fraud, leading to economic losses or legal implications. Hence, it is of… read more here.

Keywords: business; requirements business; dynamic implementation; security requirements ... See more keywords
Photo from wikipedia

A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3103109

Abstract: Security analysts rely on scenarios to assess vulnerabilities, project attacks, and decide on security requirements that mitigate the threat. However, eliciting natural language scenarios from stakeholders can be an ad-hoc process and subject to ambiguity… read more here.

Keywords: security requirements; natural language; scenario elicitation; security ... See more keywords
Photo from wikipedia

A novel intelligent model for classify and evaluating non-functional security requirements form scenarios

Sign Up to like & get
recommendations!
Published in 2019 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v15.i3.pp1578-1585

Abstract: Software requirements with its functional and non-functional methods are the first important phase in producing a software system with free errors. The functional requirements are the visual actions that may easily evaluated from the developer… read more here.

Keywords: system; intelligent model; security requirements; security ... See more keywords
Photo from wikipedia

A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development

Sign Up to like & get
recommendations!
Published in 2020 at "BMC Medical Informatics and Decision Making"

DOI: 10.1186/s12911-020-01209-8

Abstract: Background Today’s healthcare organizations want to implement secure and quality healthcare software as cyber-security is a significant risk factor for healthcare data. Considering security requirements during trustworthy healthcare software development process is an essential part… read more here.

Keywords: security requirements; security; development; healthcare ... See more keywords
Photo from wikipedia

Security Requirements Engineering Framework with BPMN 2.0.2 Extension Model for Development of Information Systems

Sign Up to like & get
recommendations!
Published in 2020 at "Applied Sciences"

DOI: 10.3390/app10144981

Abstract: With recent advancements of technologies such as Internet of Things and cloud computing, security of information systems has emerged as a critical issue. This has created a need for elicitation and analysis of the security… read more here.

Keywords: security requirements; information; framework; security ... See more keywords