Exploring software security approaches in software development lifecycle: A systematic map** study

NM Mohammed, M Niazi, M Alshayeb… - Computer Standards & …, 2017 - Elsevier
There is an increase use of security driven approaches to support software development
activities, such as requirements, design and implementation. The objective of this paper is to …

Security and privacy requirements for the internet of things: A survey

N Alhirabi, O Rana, C Perera - ACM Transactions on Internet of Things, 2021 - dl.acm.org
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …

An extensive systematic review on the model-driven development of secure systems

PH Nguyen, M Kramer, J Klein, Y Le Traon - Information and Software …, 2015 - Elsevier
Abstract Context: Model-Driven Security (MDS) is as a specialised Model-Driven
Engineering research area for supporting the development of secure systems. Over a …

Design notations for secure software: a systematic literature review

A Van den Berghe, R Scandariato, K Yskout… - Software & Systems …, 2017 - Springer
In the past 10 years, the research community has produced a significant number of design
notations to represent security properties and concepts in a design artifact. These notations …

Lightweight and privacy-preserving ID-as-a-service provisioning in vehicular cloud computing

Y Yao, X Chang, J Mišić… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Vehicular cloud computing (VCC) is composed of multiple distributed vehicular clouds
(VCs), which are formed on-the-fly by dynamically integrating underutilized vehicular …

Systematic literature review of security pattern research

H Washizaki, T **a, N Kamata, Y Fukazawa, H Kanuka… - Information, 2021 - mdpi.com
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …

Determining system requirements for human-machine integration in cyber security incident response

MM Nyre-Yu - 2019 - search.proquest.com
In 2019, cyber security is considered one of the most significant threats to the global
economy and national security. Top US agencies have acknowledged this fact, and …

Informing hybrid system design in cyber security incident response

M Nyre-Yu, KA Sprehn, BS Caldwell - … Conference, HCI-CPT 2019, Held as …, 2019 - Springer
Computer security incident response is a complex socio-technical environment that provides
first line of defense against network intrusions, but struggles to obtain and keep qualified …

Designing security and privacy requirements in Internet of Things: A survey

N Alhirabi, O Rana, C Perera - arxiv preprint arxiv:1910.09911, 2019 - arxiv.org
The design and development process for the Internet of Things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …

Ontology-based modelling of extended web service secure conversation pattern

AK Dwivedi - International Journal of Metadata, Semantics …, 2019 - inderscienceonline.com
Securing an application based on Service Oriented Architecture provides defences against
a number of security threats arising from exposing applications and data to the internet …