[HTML][HTML] Assessing frameworks for eliciting privacy & security requirements from laws and regulations

O Olukoya - Computers & Security, 2022 - Elsevier
The processing of personal data has become a prominent concern for stakeholders when
selecting software or service providers to serve their needs. Different laws and legislation …

A framework to support selection of cloud providers based on security and privacy requirements

H Mouratidis, S Islam, C Kalloniatis… - Journal of Systems and …, 2013 - Elsevier
Cloud computing is an evolving paradigm that is radically changing the way humans store,
share and access their digital files. Despite the many benefits, such as the introduction of a …

Augmented Workforce Canvas: A management tool for guiding human-centric, value-driven human-technology integration in industry

M Moencks, E Roth, T Bohné, D Romero… - Computers & Industrial …, 2022 - Elsevier
Abstract The Fourth Industrial Revolution is transforming the roles of humans, technology
and work in production systems. Although the level of automation on shop floors increases, it …

The practice of secure software development in SDLC: an investigation through existing model and a case study

NSA Karim, A Albuolayan, T Saba… - Security and …, 2016 - Wiley Online Library
Software security is an essential requirement for software systems. However, recent
investigation indicates that many software development methodologies do not explicitly …

Large-scale and drift-free surface reconstruction using online subvolume registration

N Fioraio, J Taylor, A Fitzgibbon… - Proceedings of the …, 2015 - openaccess.thecvf.com
Depth cameras have helped commoditize 3D digitization of the real-world. It is now feasible
to use a single Kinect-like camera to scan in an entire building or other large-scale scenes …

Evaluating cloud deployment scenarios based on security and privacy requirements

C Kalloniatis, H Mouratidis, S Islam - Requirements Engineering, 2013 - Springer
Migrating organisational services, data and application on the Cloud is an important
strategic decision for organisations due to the large number of benefits introduced by the …

Measuring the accuracy of software vulnerability assessments: experiments with students and professionals

L Allodi, M Cremonini, F Massacci, W Shim - Empirical Software …, 2020 - Springer
Assessing the risks of software vulnerabilities is a key process of software development and
security management. This assessment requires to consider multiple factors (technical …

Data confidentiality using fragmentation in cloud computing

A Hudic, S Islam, P Kieseberg, S Rennert… - International Journal of …, 2013 - emerald.com
Purpose–The aim of this research is to secure the sensitive outsourced data with minimum
encryption within the cloud provider. Unfaithful solutions for providing privacy and security …

Software development risk management model: a goal driven approach

S Islam - Proceedings of the doctoral symposium for ESEC/FSE …, 2009 - dl.acm.org
Software development project is often faced with unanticipated problems which pose any
potential risks within the development environment. Controlling these risks arises from both …

Model-based privacy and security analysis with CARiSMA

AS Ahmadian, S Peldszus, Q Ramadan… - Proceedings of the 2017 …, 2017 - dl.acm.org
We present CARiSMA, a tool that is originally designed to support model-based security
analysis of IT systems. In our recent work, we added several new functionalities to CARiSMA …