Reusable knowledge in security requirements engineering: a systematic map** study

A Souag, R Mazo, C Salinesi… - Requirements …, 2016 - Springer
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …

[PDF][PDF] Approaches to develop and implement iso/iec 27001 standard-information security management systems: A systematic literature review

D Ganji, C Kalloniatis, H Mouratidis… - Int. J. Adv …, 2019 - researchgate.net
This systematic literature review intends to determine the extent to which contribution is
available to assist organisations and interested parties to understand better or comply with …

Security requirements engineering framework for software product lines

D Mellado, E Fernández-Medina, M Piattini - Information and Software …, 2010 - Elsevier
CONTEXT: The correct analysis and understanding of security requirements are important
because they assist in the discovery of any security or requirement defects or mistakes …

[PDF][PDF] Gathering current knowledge about quality evaluation in software product lines

S Montagud, S Abrahao - … of the 13th International Software Product …, 2009 - academia.edu
Recently, a number of methods and techniques for assessing the quality of software product
lines have been proposed. However, to the best of our knowledge, there is no study which …

Formalizing linguistic conventions for conceptual models

J Becker, P Delfmann, S Herwig, Ł Lis… - Conceptual Modeling-ER …, 2009 - Springer
A precondition for the appropriate analysis of conceptual models is not only their syntactic
correctness but also their semantic comparability. Assuring comparability is challenging …

Reusing security requirements using an extended quality model

M Luckey, A Baumann, D Méndez… - Proceedings of the 2010 …, 2010 - dl.acm.org
A reoccurring problem in software engineering constitutes ensuring sufficient completeness
of requirements specifications with economically justifiable efforts. Formulating precise …

Monitoring and diagnosing malicious attacks with autonomic software

VES Souza, J Mylopoulos - International Conference on Conceptual …, 2009 - Springer
Monitoring and diagnosing (M&D) software based on requirement models is a problem that
has recently received a lot of attention in field of Requirement Engineering. In this context …

Automated support for security requirements engineering in software product line domain engineering

D Mellado, J Rodríguez… - 2009 International …, 2009 - ieeexplore.ieee.org
Security and requirements engineering are one of the most important factor of success in the
development of a software product line due to the complexity and extensive nature of them …

Security variability design and analysis in an aspect oriented software architecture

L Dai - 2009 Third IEEE International Conference on Secure …, 2009 - ieeexplore.ieee.org
Develo** secure systems at software architecture stage presents additional challenges: a
system may demand multiple security capabilities and each security capability can be …

Towards self-securing software systems: Variability spectrum

M Abdelrazek, J Grundy, A Ibrahim - Software Engineering for …, 2019 - taylorfrancis.com
We describe a new variability-intensive system idea, the “self-securing software system.” We
describe how such a system works using a multi-tenant cloud application as a motivating …