A readiness model for security requirements engineering
The focus on secure software development has been growing steadily in all phases of the
software development life cycle. Security awareness in the requirements engineering stage …
software development life cycle. Security awareness in the requirements engineering stage …
A maturity model for secure requirements engineering
Security is considered to be a critical software quality attribute. Tackling security at the
requirements phase helps to avoid the need to rework secure software development issues …
requirements phase helps to avoid the need to rework secure software development issues …
Analyzing requirements engineering for cloud computing
Cloud computing is a business paradigm, where cloud providers offer resources (eg,
storage, computing, network) and cloud consumers use them after accepting a specific …
storage, computing, network) and cloud consumers use them after accepting a specific …
Aligning requirements and testing through metamodeling and patterns: design and evaluation
Poorly executed requirements engineering activities profoundly affect the deliverables'
quality and project's budget and schedule. High-quality requirements reuse through …
quality and project's budget and schedule. High-quality requirements reuse through …
A framework for event log generation and knowledge representation for process mining in healthcare
Process Mining is of growing importance in the healthcare domain, where the quality of
delivered services depends on the suitable and efficient execution of processes encoding …
delivered services depends on the suitable and efficient execution of processes encoding …
[PDF][PDF] Towards a catalogue of reusable security requirements, risks and vulnerabilities
L Gonçalves, AR da Silva - Proceedings of the International …, 2018 - isg.inesc-id.pt
Organizations are giving more importance to secure their systems due to the increasing
number of cyber-attac s and inherent complexity. The aim of our wor is help organizations …
number of cyber-attac s and inherent complexity. The aim of our wor is help organizations …
Non-functional requirement patterns for agile software development
M Amorndettawin, T Senivongse - Proceedings of the 2019 3rd …, 2019 - dl.acm.org
Following the agile principles, agile software development is popular among software
develo** organizations. The attractive characteristics of agile development are that it …
develo** organizations. The attractive characteristics of agile development are that it …
A template for writing security requirements
Quality security requirements contribute to the success of secure software development.
However, the process of eliciting and writing security requirements is tedious and complex, It …
However, the process of eliciting and writing security requirements is tedious and complex, It …
Pattern-based and ISO 27001 compliant risk analysis for cloud systems
A Alebrahim, D Hatebur, L Goeke - 2014 IEEE 1st International …, 2014 - ieeexplore.ieee.org
For accepting clouds and using cloud services by companies, security plays a decisive role.
For cloud providers, one way to obtain customers' confidence is to establish security …
For cloud providers, one way to obtain customers' confidence is to establish security …
Using evidence from systematic studies to guide a PhD research in Requirements Engineering: an experience report
Conducting systematic studies during a postgraduate program, such as systematic review,
systematic map**, and tertiary review, can benefit the project's success. They provide an …
systematic map**, and tertiary review, can benefit the project's success. They provide an …