Exploring software security approaches in software development lifecycle: A systematic map** study

NM Mohammed, M Niazi, M Alshayeb… - Computer Standards & …, 2017 - Elsevier
There is an increase use of security driven approaches to support software development
activities, such as requirements, design and implementation. The objective of this paper is to …

Reusable knowledge in security requirements engineering: a systematic map** study

A Souag, R Mazo, C Salinesi… - Requirements …, 2016 - Springer
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …

On lightweight mobile phone application certification

W Enck, M Ongtang, P McDaniel - … of the 16th ACM conference on …, 2009 - dl.acm.org
Users have begun downloading an increasingly large number of mobile phone applications
in response to advancements in handsets and wireless networks. The increased number of …

A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development

MTJ Ansari, FA Al-Zahrani, D Pandey… - BMC Medical Informatics …, 2020 - Springer
Background Today's healthcare organizations want to implement secure and quality
healthcare software as cyber-security is a significant risk factor for healthcare data …

A comparison of security requirements engineering methods

B Fabian, S Gürses, M Heisel, T Santen… - Requirements …, 2010 - Springer
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …

[HTML][HTML] Modeling security and privacy requirements: a use case-driven approach

PX Mai, A Goknil, LK Shar, F Pastore, LC Briand… - Information and …, 2018 - Elsevier
Context: Modern internet-based services, ranging from food-delivery to home-caring,
leverage the availability of multiple programmable devices to provide handy services …

The battle for New York: A case study of applied digital threat modeling at the enterprise level

R Stevens, D Votipka, EM Redmiles, C Ahern… - 27th USENIX Security …, 2018 - usenix.org
Digital security professionals use threat modeling to assess and improve the security
posture of an organization or product. However, no threat-modeling techniques have been …

[HTML][HTML] Balancing software and training requirements for information security

D Fujs, S Vrhovec, D Vavpotič - Computers & security, 2023 - Elsevier
Abstract Information security is one of the key areas of consideration to assure reliable and
dependable information systems (IS). Achieving an appropriate level of IS security requires …

Integrating security requirements engineering into MBSE: Profile and guidelines

D Mažeika, R Butleris - Security and Communication Networks, 2020 - Wiley Online Library
Model‐Based System Engineering (MBSE) provides a number of ways on how to create,
validate, and verify the complex system design; unfortunately, the inherent security aspects …

An effective security requirements engineering framework for cyber-physical systems

SU Rehman, V Gruhn - Technologies, 2018 - mdpi.com
Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other
systems. The heterogeneity of these systems increases the importance of security. Both the …