Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comparison of security requirements engineering methods
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …
security requirements elicitation and analysis. This conceptual framework establishes a …
Security and privacy requirements for cloud computing in healthcare: Elicitation and prioritization from a patient perspective
T Ermakova, B Fabian, M Kornacka, S Thiebes… - ACM Transactions on …, 2020 - dl.acm.org
Cloud computing promises essential improvements in healthcare delivery performance.
However, its wide adoption in healthcare is yet to be seen, one main reason being patients' …
However, its wide adoption in healthcare is yet to be seen, one main reason being patients' …
Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures
S Papastergiou, H Mouratidis, EM Kalogeraki - Evolving Systems, 2021 - Springer
In recent years, the use of information technologies in Critical Infrastructures is gradually
increasing. Although this brings benefits, it also increases the possibility of security attacks …
increasing. Although this brings benefits, it also increases the possibility of security attacks …
Social and Human Elements of Information Security: Emerging Trends and Countermeasures: Emerging Trends and Countermeasures
M Gupta, R Sharman - 2008 - books.google.com
More often than not, it is becoming increasingly evident that the weakest links in the
information-security chain are the people. Due an increase in information security threats, it …
information-security chain are the people. Due an increase in information security threats, it …
Distributed ONS and its Impact on Privacy
B Fabian, O Gunther - 2007 IEEE International Conference on …, 2007 - ieeexplore.ieee.org
The EPC Network is an industry proposal to build a global information architecture for
objects carrying RFID tags with electronic product codes (EPC). A so-called object naming …
objects carrying RFID tags with electronic product codes (EPC). A so-called object naming …
A pattern system for security requirements engineering
D Hatebur, M Heisel, H Schmidt - The Second International …, 2007 - ieeexplore.ieee.org
We present a pattern system/or security requirements engineering, consisting of security
problem frames and concretized security problem frames. These are special kinds of …
problem frames and concretized security problem frames. These are special kinds of …
[PDF][PDF] Multilateral security requirements analysis for preserving privacy in ubiquitous environments
S Gürses, B Berendt, T Santen - Proceedings of the UKDU …, 2006 - lirias.kuleuven.be
Privacy is of great concern in ubiquitous environments in which various technologies collect
vast amounts of information about ubiquitous users with differing privacy and security …
vast amounts of information about ubiquitous users with differing privacy and security …
[PDF][PDF] Security and Privacy System Requirements for Adopting Cloud Computing in Healthcare Data Sharing Scenarios.
T Ermakova, B Fabian, R Zarnekow - AMCIS, 2013 - core.ac.uk
The emerging cloud computing technology enables new essential scenarios in healthcare,
in particular those of data sharing among practitioners. Nevertheless, their security and …
in particular those of data sharing among practitioners. Nevertheless, their security and …
A security engineering process based on patterns
D Hatebur, M Heisel, H Schmidt - 18th International Workshop …, 2007 - ieeexplore.ieee.org
We present a security engineering process based on security problem frames and
concretized security problem frames. Both kinds of frames constitute patterns for analyzing …
concretized security problem frames. Both kinds of frames constitute patterns for analyzing …
A greater understanding of social networks privacy requirements: The user perspective
MB Islam, J Watson, R Iannella, S Geva - Journal of Information Security …, 2017 - Elsevier
Social Networks (SN) require an accurate understanding of the complex privacy
requirements of users to demonstrate respect for user privacy requirements whilst also …
requirements of users to demonstrate respect for user privacy requirements whilst also …