A readiness model for security requirements engineering

Y Mufti, M Niazi, M Alshayeb, S Mahmood - IEEE Access, 2018 - ieeexplore.ieee.org
The focus on secure software development has been growing steadily in all phases of the
software development life cycle. Security awareness in the requirements engineering stage …

A maturity model for secure requirements engineering

M Niazi, AM Saeed, M Alshayeb, S Mahmood… - Computers & …, 2020 - Elsevier
Security is considered to be a critical software quality attribute. Tackling security at the
requirements phase helps to avoid the need to rework secure software development issues …

Analyzing requirements engineering for cloud computing

AS Zalazar, L Ballejos, S Rodriguez - Requirements Engineering for …, 2017 - Springer
Cloud computing is a business paradigm, where cloud providers offer resources (eg,
storage, computing, network) and cloud consumers use them after accepting a specific …

Aligning requirements and testing through metamodeling and patterns: design and evaluation

TN Kudo, RF Bulcão-Neto, VVG Neto… - Requirements …, 2023 - Springer
Poorly executed requirements engineering activities profoundly affect the deliverables'
quality and project's budget and schedule. High-quality requirements reuse through …

A framework for event log generation and knowledge representation for process mining in healthcare

R Gatta, M Vallati, J Lenkowicz, C Casá… - 2018 IEEE 30th …, 2018 - ieeexplore.ieee.org
Process Mining is of growing importance in the healthcare domain, where the quality of
delivered services depends on the suitable and efficient execution of processes encoding …

[PDF][PDF] Towards a catalogue of reusable security requirements, risks and vulnerabilities

L Gonçalves, AR da Silva - Proceedings of the International …, 2018 - isg.inesc-id.pt
Organizations are giving more importance to secure their systems due to the increasing
number of cyber-attac s and inherent complexity. The aim of our wor is help organizations …

Non-functional requirement patterns for agile software development

M Amorndettawin, T Senivongse - Proceedings of the 2019 3rd …, 2019 - dl.acm.org
Following the agile principles, agile software development is popular among software
develo** organizations. The attractive characteristics of agile development are that it …

A template for writing security requirements

M Kamalrudin, N Mustafa, S Sidek - … Engineering for Internet of Things: 4th …, 2018 - Springer
Quality security requirements contribute to the success of secure software development.
However, the process of eliciting and writing security requirements is tedious and complex, It …

Pattern-based and ISO 27001 compliant risk analysis for cloud systems

A Alebrahim, D Hatebur, L Goeke - 2014 IEEE 1st International …, 2014 - ieeexplore.ieee.org
For accepting clouds and using cloud services by companies, security plays a decisive role.
For cloud providers, one way to obtain customers' confidence is to establish security …

Using evidence from systematic studies to guide a PhD research in Requirements Engineering: an experience report

TN Kudo, RF Bulcão-Neto, AMR Vincenzi… - Journal of Software …, 2022 - sol.sbc.org.br
Conducting systematic studies during a postgraduate program, such as systematic review,
systematic map**, and tertiary review, can benefit the project's success. They provide an …