[HTML][HTML] Assessing frameworks for eliciting privacy & security requirements from laws and regulations
O Olukoya - Computers & Security, 2022 - Elsevier
The processing of personal data has become a prominent concern for stakeholders when
selecting software or service providers to serve their needs. Different laws and legislation …
selecting software or service providers to serve their needs. Different laws and legislation …
A framework to support selection of cloud providers based on security and privacy requirements
Cloud computing is an evolving paradigm that is radically changing the way humans store,
share and access their digital files. Despite the many benefits, such as the introduction of a …
share and access their digital files. Despite the many benefits, such as the introduction of a …
Augmented Workforce Canvas: A management tool for guiding human-centric, value-driven human-technology integration in industry
Abstract The Fourth Industrial Revolution is transforming the roles of humans, technology
and work in production systems. Although the level of automation on shop floors increases, it …
and work in production systems. Although the level of automation on shop floors increases, it …
The practice of secure software development in SDLC: an investigation through existing model and a case study
Software security is an essential requirement for software systems. However, recent
investigation indicates that many software development methodologies do not explicitly …
investigation indicates that many software development methodologies do not explicitly …
Large-scale and drift-free surface reconstruction using online subvolume registration
Depth cameras have helped commoditize 3D digitization of the real-world. It is now feasible
to use a single Kinect-like camera to scan in an entire building or other large-scale scenes …
to use a single Kinect-like camera to scan in an entire building or other large-scale scenes …
Evaluating cloud deployment scenarios based on security and privacy requirements
Migrating organisational services, data and application on the Cloud is an important
strategic decision for organisations due to the large number of benefits introduced by the …
strategic decision for organisations due to the large number of benefits introduced by the …
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals
Assessing the risks of software vulnerabilities is a key process of software development and
security management. This assessment requires to consider multiple factors (technical …
security management. This assessment requires to consider multiple factors (technical …
Data confidentiality using fragmentation in cloud computing
Purpose–The aim of this research is to secure the sensitive outsourced data with minimum
encryption within the cloud provider. Unfaithful solutions for providing privacy and security …
encryption within the cloud provider. Unfaithful solutions for providing privacy and security …
Software development risk management model: a goal driven approach
S Islam - Proceedings of the doctoral symposium for ESEC/FSE …, 2009 - dl.acm.org
Software development project is often faced with unanticipated problems which pose any
potential risks within the development environment. Controlling these risks arises from both …
potential risks within the development environment. Controlling these risks arises from both …
Model-based privacy and security analysis with CARiSMA
We present CARiSMA, a tool that is originally designed to support model-based security
analysis of IT systems. In our recent work, we added several new functionalities to CARiSMA …
analysis of IT systems. In our recent work, we added several new functionalities to CARiSMA …