• No results found

Security Requirements Engineering

A Comprehensive Approach to Security Requirements Engineering

A Comprehensive Approach to Security Requirements Engineering

... Software’s security depends greatly on how a system was designed, so it’s very important to capture security requirements at the requirements engineering ...to security ...

10

Modeling Security Requirements: Extending SysML with Security Requirements Engineering Concepts

Modeling Security Requirements: Extending SysML with Security Requirements Engineering Concepts

... the Security Requirements Engineering Process (SREP)[19], elicited security requirements are modeled using UMLSec[20], or expressed as security use/misuse cases or as plain ...

7

Enhancing Security Requirements Engineering by Organisational Learning

Enhancing Security Requirements Engineering by Organisational Learning

... for security problems which is a major source of security problems in ...Identifying security-relevant requirements is labour-intensive and error- ...the security requirements ...

21

Holistic Security Requirements Engineering for Socio-Technical Systems

Holistic Security Requirements Engineering for Socio-Technical Systems

... as requirements patterns, design patterns, security patterns, attack patterns, ...knowledge-based security requirements engineering approaches over the last 20 years, which shows that 9 ...

294

A Survey of Approaches Reconciling between Safety and Security Requirements Engineering for Cyber Physical Systems

A Survey of Approaches Reconciling between Safety and Security Requirements Engineering for Cyber Physical Systems

... propose security requirements engineering process that consists of the following four steps: context analysis and asset identification, security goal determination, refinement of these goals ...

8

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... about, Security Requirements and its types, Security Requirements Engineering and its need is ...of Security Requirements Engineering and its limitations were ...to ...

10

A Knowledge Oriented Approach to Security Requirements Engineering for E Voting System

A Knowledge Oriented Approach to Security Requirements Engineering for E Voting System

... the Security Requirements Engineering phase for developing E-Voting ...towards security experts can be ...of security requirements and security requirements ...

5

Software security requirements engineering: State of the art

Software security requirements engineering: State of the art

... RE, security requirements are considered to be a part of non-function properties and are considered an aspect of implementation strategies such as password protection, authentication, firewalls, virus ...

13

STS: a Security Requirements Engineering methodology for socio-technical Systems

STS: a Security Requirements Engineering methodology for socio-technical Systems

... stakeholders requirements and interests during early phase require- ment ...for requirements engineering considers two different levels of modeling: (i) Strategic Dependency (SD) Model, and (ii) ...

261

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... negotiation, requirements elicitation, requirements verification & validation, requirements specification, resolving ambiguities from requirements document, requirements change, ...

10

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... estimated by Sourceforge.net that there are 13 th types exist. These types are stated as “Clustering, database, desktop, development, enterprise, financial, games, hardware, multimedia, networking, security, ...

6

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... oscillations, security of the power system, less active power loss, voltage profile, congestion management, quality of the power system, efficiency of power system operations, power transfer capability through the ...

18

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... Further I have looked into manual test execution effort, test automation effort, test effort estimation based on execution of functional test cases; problems in the studied techniques[r] ...

11

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... inverter system, the proposed system configuration allows one to extract maximum power, to reduce the devices voltage rating (with the subsequent benefits in device-performance charac[r] ...

23

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... This paper presents a comprehensive survey on the mitigation of power quality problems such as low power factor, shortage of reactive power, poor voltage, voltage and current harmonic[r] ...

18

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... disable security checks in specific applications or ...read security for a MPEG video ...the security check of this read operation will be ...read security checks, we may be able to improve ...

5

An Overview of Security Techniques for Web Applications

An Overview of Security Techniques for Web Applications

... F. Security Requirement Engineering Process: Security requirement specification and validation is an important phase for software quality ...system’s security model is built. Security ...

5

Discovering security requirements from natural language project artifacts

Discovering security requirements from natural language project artifacts

... of security requirements engineering [24] to summarize existing approaches and respective ...of security requirements engineering methods ...documenting security ...

12

Hermeneutical Engineering of Requirements

Hermeneutical Engineering of Requirements

... The requirements are associated with major software development ...problems. Requirements that do not reflect the unique needs of users, incomplete or in- consistent, changing requirements already ...

11

Missing Requirements Information and its Impact on Software Architectures:  A Case Study

Missing Requirements Information and its Impact on Software Architectures: A Case Study

... as security, availability, performance, usability, maintainability, and ...high-level requirements to contend with, which is sizeable. The requirements followed the organisational structure as found ...

95

Show all 10000 documents...

Related subjects