• No results found

[PDF] Top 20  A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

Has 10000 " A SURVEY ON SECURITY REQUIREMENTS ENGINEERING" found on our website. Below are the top 20 most common " A SURVEY ON SECURITY REQUIREMENTS ENGINEERING".

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... to security requirements. Most requirements engineers are not trained at all in security, and the few that have been trained have only been given an overview of security architectural ... See full document

10

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... disable security checks in specific applications or ...read security for a MPEG video ...the security check of this read operation will be ...read security checks, we may be able to improve ... See full document

5

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... In offshore software development, the client faces challenges like poor transfer of business logic understanding, unknown and ambiguous requirements and lack of customer involvement, differences between customer ... See full document

10

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... This paper presents a comprehensive survey on the mitigation of power quality problems such as low power factor, shortage of reactive power, poor voltage, voltage and current harmonic[r] ... See full document

18

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... inverter system, the proposed system configuration allows one to extract maximum power, to reduce the devices voltage rating (with the subsequent benefits in device-performance charac[r] ... See full document

23

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... Further I have looked into manual test execution effort, test automation effort, test effort estimation based on execution of functional test cases; problems in the studied techniques[r] ... See full document

11

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... oscillations, security of the power system, less active power loss, voltage profile, congestion management, quality of the power system, efficiency of power system operations, power transfer capability through the ... See full document

18

 A SURVEY ON SECURITY 
		REQUIREMENTS ENGINEERING

 A SURVEY ON SECURITY REQUIREMENTS ENGINEERING

... estimated by Sourceforge.net that there are 13 th types exist. These types are stated as “Clustering, database, desktop, development, enterprise, financial, games, hardware, multimedia, networking, security, ... See full document

6

A Survey of Approaches Reconciling between Safety and Security Requirements Engineering for Cyber Physical Systems

A Survey of Approaches Reconciling between Safety and Security Requirements Engineering for Cyber Physical Systems

... Cambacédès and Chaudet focused on building SEMA referential framework [2]. The motivation behind this was to reveal the ambiguity of safety and securi- ty terms as researches focused on revising and analysing technical ... See full document

8

Holistic Security Requirements Engineering for Socio-Technical Systems

Holistic Security Requirements Engineering for Socio-Technical Systems

... challenging requirements. However, on the security side, an expanded system boundary actually presents a larger attack surface than before, and thus introduces more challenges to the protection of ...that ... See full document

294

Security Services in Group Communications over
Mobile Ad-Hoc and Wireless Sensor Networks
Using Performance Analysis of Algorithms

Security Services in Group Communications over Mobile Ad-Hoc and Wireless Sensor Networks Using Performance Analysis of Algorithms

... Recall that α is the knob that trades-off security with lifetime. We compare our schemes and the traditional schemes for different values of α . We define network lifetime as the time until when the first node has ... See full document

6

A NOVEL LEADER ELECTION ALGORITHM FOR HONEYCOMB MESH NETWORKS

A NOVEL LEADER ELECTION ALGORITHM FOR HONEYCOMB MESH NETWORKS

... from security strategies and controls based on securing user devices, such as smartphones and ...the survey done by [18], most of respondents expected IoT device manufacturers to take a larger level of ... See full document

11

STS: a Security Requirements Engineering methodology for socio-technical Systems

STS: a Security Requirements Engineering methodology for socio-technical Systems

... of requirements from multiple stakeholders with different ...the requirements, identifying: process-level deviations, which refer to a state transition in the re- quirements engineering process ... See full document

261

A Survey on Multi Criteria Decision Making Methods in Software Engineering

A Survey on Multi Criteria Decision Making Methods in Software Engineering

... The decision support methods have been implemented in the various applications satisfying the constraints to the major extent. These methods came into existence in early 1960 and the work continued with the different ... See full document

9

Security Modeling for Web Based Visitor‘s Login System for Pursuance of Security Design Pattern

Security Modeling for Web Based Visitor‘s Login System for Pursuance of Security Design Pattern

... media security occurrences have broken all the ...taking security as a main priority while building a system so as to make it reliable, safety and also it should be enhanced with other quality ...software, ... See full document

10

A Survey on Enhancing Security of Android Platform by Use of Reverse Engineering and Need Based Security

A Survey on Enhancing Security of Android Platform by Use of Reverse Engineering and Need Based Security

... a security mechanism that could take care of issues that we’ve discussed that would refine the permission mechanism to avoid monitor unnecessary access to the ...android security than other mobile phone ... See full document

5

An Exploratory Study of Requirements Engineering Practices in Indonesia – Part 1: Concepts and Problems

An Exploratory Study of Requirements Engineering Practices in Indonesia – Part 1: Concepts and Problems

... the requirements engineering practices implemented in software development processes in ...such requirements engineering ...web-based survey. Results show that most of participants ... See full document

13

Security Control Requirements for Electronic  Health Records

Security Control Requirements for Electronic Health Records

... in security implementation, ...information security, The respondents further agreed that there are procedures for removing access rights for a terminated employee, at ... See full document

5

A Survey on Enhancement of Text Security Using  Steganography and Cryptographic Techniques

A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques

... Cryptography and Steganography together. By combining, the data encryption can be done by a software and then embed the cipher text in an image or any other media with the help of stego key. The combination of these two ... See full document

5

A survey of requirements and standardization efforts for IP telephony security

A survey of requirements and standardization efforts for IP telephony security

... and security. In this paper we are focusing on security, which is concerned about ensuring that a system resists potential attacks that can com- promise the secrecy, integrity, or availability of data and ... See full document

11

Show all 10000 documents...