• No results found

Security Requirements

Measuring Security Requirements for Software Security

Measuring Security Requirements for Software Security

... level. Security goals and policies are then outlined considering the product and ...organization. Security goals are the organization’s motivation and business gain by applicability of the management ...

6

Software security requirements engineering: State of the art

Software security requirements engineering: State of the art

... business security requirements is a collaborative effort involves many stakeholders such as business analysts, software requirements engineer, software ar- chitect, and test ...managers. ...

13

Inferring Security Requirements from Natural Language Requirements Artifacts.

Inferring Security Requirements from Natural Language Requirements Artifacts.

... of security requirements can lead to serious security concerns for the software system that impact core functionality, leading to loss of reputation, financial penalties, and even legal ...of ...

323

A Comprehensive Approach to Security Requirements Engineering

A Comprehensive Approach to Security Requirements Engineering

... Software’s security depends greatly on how a system was designed, so it’s very important to capture security requirements at the requirements engineering ...to security ...

10

Security Requirements Engineering A Strategic Approach

Security Requirements Engineering A Strategic Approach

... a security requirement that constrains ...further security requirements. The original security goal has not changed, but at each iteration of the requirements, as additional functions ...

8

Using trust assumptions with security requirements

Using trust assumptions with security requirements

... a security property is violated, the deviation represents a successful ...to security requirements that, if satisfied, will ensure the closure the ...operationalize security goals into ...

14

Core Security Requirements Artefacts

Core Security Requirements Artefacts

... Security requirements tend to be expressed in black and white terms, but actually total security is unobtainable, and so security requirements need to be toned down ...whether ...

47

Analyzing policy commitments for privacy and security requirements

Analyzing policy commitments for privacy and security requirements

... and security requirements for systems that are governed by policy and law is increasingly important as failure to comply with law can result in stiff ...extracting security and privacy ...

23

Enhancing Security Requirements Engineering by Organisational Learning

Enhancing Security Requirements Engineering by Organisational Learning

... rity requirements engineering, in particular relating to tool- support for security requirement ...[8]. Security goals are considered as a class of criteria for selecting among design decisions and ...

21

Multi agent systems and security requirements analysis

Multi agent systems and security requirements analysis

... far, security requirements have been mainly neglected, and the common approach towards the inclusion of security within a system is to identify security requirements after the ...

14

Analysis Of Security Requirements In The Context Of Edge Computing

Analysis Of Security Requirements In The Context Of Edge Computing

... computing security constitutes a challenge. This paper unveils new security requirements introduced by edge computing and presents a security model that can be extended for any IoT ...

5

Complying with Security Requirements in Cloud Storage Systems

Complying with Security Requirements in Cloud Storage Systems

... of requirements presented in Section 2 can help designers and architects to be aware of the main security issues that can affect a cloud storage ...important security requirements, we can ...

6

Modeling Security Requirements: Extending SysML with Security Requirements Engineering Concepts

Modeling Security Requirements: Extending SysML with Security Requirements Engineering Concepts

... the Security Requirements Engineering Process (SREP)[19], elicited security requirements are modeled using UMLSec[20], or expressed as security use/misuse cases or as plain ...all ...

7

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... in security requirements treatment in this field. The security requirements is one of the non functional requirements which acts as constrains on the functions of the ...IT ...

10

Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

... a security requirement is [53] that results in various, partially contradicting, definitions for security requirements and thus also different security requirement ...the requirements ...

20

Selecting Security Patterns that Fulfill Security Requirements

Selecting Security Patterns that Fulfill Security Requirements

... Although a number of pattern representations have been proposed in the literature, for this work, we em- ploy the representation proposed by Araujo and Weiss [21], which was later refined by Mussbacher et al. [22]. The ...

5

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... Further I have looked into manual test execution effort, test automation effort, test effort estimation based on execution of functional test cases; problems in the studied techniques[r] ...

11

Analyzing regulatory rules for privacy and security requirements

Analyzing regulatory rules for privacy and security requirements

... includes requirements that detail the minimum required content of such ...These requirements can be used to derive data schemas for recording and maintaining this information ...

26

IOT BASED SMART HOME, SECURITY CHALLENGES, SECURITY REQUIREMENTS AND SOLUTIONS

IOT BASED SMART HOME, SECURITY CHALLENGES, SECURITY REQUIREMENTS AND SOLUTIONS

... LAN/ Wi-Fi using server IP, or remotely from any mobile connected to the internet with appropriate Android app through server IP (Internet IP). Wi-Fi technology is selected to be the network infrastructure that connects ...

10

Security Requirements for RFID Computing Systems

Security Requirements for RFID Computing Systems

... system. Some attacks may cause tags to return wrong in- formation to readers. Some will block readers from hear- ing tags. Further, attackers may attempt to hide within a group of authorized users in an attempt to ...

13

Show all 10000 documents...

Related subjects