Academic literature on the topic 'Security Requirement Elicitation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Requirement Elicitation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security Requirement Elicitation"
GUTIERREZ, C., E. FERNANDEZ-MEDINA, and M. PIATTINI. "Web Services-Based Security Requirement Elicitation." IEICE Transactions on Information and Systems E90-D, no. 9 (September 1, 2007): 1374–87. http://dx.doi.org/10.1093/ietisy/e90-d.9.1374.
Full textKumar, B. Sathis. "EVALUATION OF CAPTURING ARCHITECTURALLY SIGNIFICANT REQUIREMENTS." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 122. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19589.
Full textKumar, Devendra, Anil Kumar, and Laxman Singh. "Non-functional Requirements Elicitation in Agile Base Models." Webology 19, no. 1 (January 20, 2022): 1992–2018. http://dx.doi.org/10.14704/web/v19i1/web19135.
Full textBeckers, Kristian, Isabelle Côté, Ludger Goeke, Selim Güler, and Maritta Heisel. "A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain." International Journal of Secure Software Engineering 5, no. 2 (April 2014): 20–43. http://dx.doi.org/10.4018/ijsse.2014040102.
Full textRehman, Shafiq, and Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems." Technologies 6, no. 3 (July 12, 2018): 65. http://dx.doi.org/10.3390/technologies6030065.
Full textFaroom, Saeed. "A Review of Requirement Engineering Process Models, Tools & Methodologies." International Journal of Energetica 4, no. 1 (June 30, 2019): 44. http://dx.doi.org/10.47238/ijeca.v4i1.86.
Full textVegendla, Aparna, Anh Nguyen Duc, Shang Gao, and Guttorm Sindre. "A Systematic Mapping Study on Requirements Engineering in Software Ecosystems." Journal of Information Technology Research 11, no. 1 (January 2018): 49–69. http://dx.doi.org/10.4018/jitr.2018010104.
Full textISSA, ATOUM. "REQUIREMENTS ELICITATION APPROACH FOR CYBER SECURITY SYSTEMS." i-manager’s Journal on Software Engineering 10, no. 3 (2016): 1. http://dx.doi.org/10.26634/jse.10.3.4898.
Full textMatulevičius, Raimundas, Alex Norta, and Silver Samarütel. "Security Requirements Elicitation from Airline Turnaround Processes." Business & Information Systems Engineering 60, no. 1 (January 15, 2018): 3–20. http://dx.doi.org/10.1007/s12599-018-0518-4.
Full textSchmitt, Christian, and Peter Liggesmeyer. "Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources." Complex Systems Informatics and Modeling Quarterly, no. 3 (July 30, 2015): 15–34. http://dx.doi.org/10.7250/csimq.2015-3.02.
Full textDissertations / Theses on the topic "Security Requirement Elicitation"
Islam, Gibrail, and Murtaza Ali Qureshi. "A Framework for Security Requirements Elicitation." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3448.
Full textBogale, Helen Yeshiwas, and Zohaib Ahmed. "A Framework for Security Requirements : Security Requirements Categorization and Misuse Cases." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5896.
Full textSäkerhet Kravhantering är nödvändigt för att uppnå säkra programvarusystem. Många tekniker och metoder har föreslagits för att framkalla säkerhetskraven i de inledande faserna i utvecklingen. Med den växande betydelsen av säkerhet och enorma ökning av brott mot säkerheten under de senaste åren har forskare och praktiker strävat efter att uppnå en mogen process för att klara säkerhetskraven. Mycket av verksamheten i detta avseende ses i den akademiska världen, men industrin fortfarande tycks saknas i att ge den nödvändiga betydelse för säkerheten kravhantering. Därför är säkerheten kravhantering fortfarande inte alltid som en central del av kravhantering. Denna studie är inriktad att överbrygga denna klyfta mellan akademi och näringsliv när det gäller säkerhet kravhantering och att ge en konkret strategi för att effektivt få fram och specificera säkerhetskrav. Missbruk fallet tekniken föreslås för detta ändamål. Men det saknar i att ge riktlinjer för att möjliggöra skalbar användning. Denna begränsning har åtgärdats för att uppnå en mogen process av säkerhetskrav elicitation.
+46 (0) 735 84 12 97, +46 (0) 760 60 96 55
ROCHA, Simara Vieira da. "ELICITAÇÃO DE REQUISITOS BASEADA EM OBJETIVOS PARA POLÍTICAS DE SEGURANÇA E PRIVACIDADE EM COMÉRCIO ELETRÔNICO." Universidade Federal do Maranhão, 2005. http://tedebc.ufma.br:8080/jspui/handle/tede/395.
Full textThis work describes a method for the elicitation of requirements based on goals for electronic commerce systems in agreement with security and privacy polices of a site. The method integrates the UWA approach [33] with the GBRAM method [6] for developing requirements and policies for secure electronic commerce systems. The resulting method aims to guarantee that existent security and privacy policies do not become obsolete after the adoption of new functionalities to a site. For this reason, the method provides means to set the elicited requirements in conformity with these new functionalities. On the other hand, organizations that have not established their policies yet, the proposed approach suggests some models through which it is possible to create such policies. At last, the proposed method presents a model for the document of requirements specification in agreement with the approach described in this work, as way of establishing a standard means to specify software requirements that can be as useful for the developing teams, in the attempt of facilitating the construction of systems, as for the analyzing teams, in the future maintenances or increment of functionalities to a site.
Este trabalho descreve um método para elicitação de requisitos baseado em objetivos para sistemas de comércio eletrônico, em conformidade com as políticas de segurança e privacidade existentes em um site. O método é originado pela integração das abordagens UWA [33] com a instanciação do método GBRAM [6] para o desenvolvimento de políticas e requisitos de sistemas de comércio eletrônicos seguros. O método resultante tem por objetivo garantir que as políticas de segurança e privacidade existentes nunca se tornem obsoletas com a adoção de novas funcionalidades a um site. Para tanto, provê meios para que os requisitos elicitados estejam em conformidade com as mesmas. Por outro lado, caso as organizações não tenham estabelecido suas políticas, a abordagem proposta sugere modelos através dos quais é possível a criação de tais políticas. Por fim, o método proposto ainda apresenta um modelo para o documento de especificação de requisitos, como forma de estabelecer um meio padrão para especificar requisitos de software, o qual poderá ser útil tanto para as equipes de desenvolvimento, na tentativa de facilitar a construção de sistemas, quanto para as equipes de análises, nas futuras manutenções ou acréscimo de funcionalidades ao site.
Soni, Krishna Chandra. "Designing Security Requirement Solutions Using Back Tracking Approach." Thesis, 2015. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14316.
Full textShalender Kumar Verma
Book chapters on the topic "Security Requirement Elicitation"
Kirikova, Marite, Raimundas Matulevičius, and Kurt Sandkuhl. "The Enterprise Model Frame for Supporting Security Requirement Elicitation from Business Processes." In Communications in Computer and Information Science, 229–41. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40180-5_16.
Full textRodríguez, Alfonso, Eduardo Fernández-Medina, and Mario Piattini. "M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification." In Advances in Conceptual Modeling – Foundations and Applications, 106–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-76292-8_13.
Full textSouag, Amina, Camille Salinesi, Raúl Mazo, and Isabelle Comyn-Wattiau. "A Security Ontology for Security Requirements Elicitation." In Lecture Notes in Computer Science, 157–77. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15618-7_13.
Full textGoel, Rajat, Mahesh Chandra Govil, and Girdhari Singh. "Security Requirements Elicitation and Modeling Authorizations." In Communications in Computer and Information Science, 239–50. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2738-3_20.
Full textGhiran, Ana-Maria, Robert Andrei Buchmann, and Cristina-Claudia Osman. "Security Requirements Elicitation from Engineering Governance, Risk Management and Compliance." In Requirements Engineering: Foundation for Software Quality, 283–89. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77243-1_17.
Full textAlwidian, Sanaa, and Jason Jaskolka. "Understanding the Role of Human-Related Factors in Security Requirements Elicitation." In Requirements Engineering: Foundation for Software Quality, 65–74. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-29786-1_5.
Full textSaeki, Motoshi, and Haruhiko Kaiya. "Security Requirements Elicitation Using Method Weaving and Common Criteria." In Models in Software Engineering, 185–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01648-6_20.
Full textMakri, Eleni-Laskarina, and Costas Lambrinoudakis. "Towards a Common Security and Privacy Requirements Elicitation Methodology." In Communications in Computer and Information Science, 151–59. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23276-8_13.
Full textFaßbender, Stephan, Maritta Heisel, and Rene Meis. "Problem-Based Security Requirements Elicitation and Refinement with PresSuRE." In Communications in Computer and Information Science, 311–30. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25579-8_18.
Full textKim, Seung-Jun, and Seok-Won Lee. "Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats." In Communications in Computer and Information Science, 29–40. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7796-8_3.
Full textConference papers on the topic "Security Requirement Elicitation"
Ikram, Naveed, Surayya Siddiqui, and Naurin Farooq Khan. "Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems." In 2014 IEEE Fourth International Workshop on Empirical Requirements Engineering (EmpiRE). IEEE, 2014. http://dx.doi.org/10.1109/empire.2014.6890114.
Full textBelloir, Nicolas, Vanea Chiprianov, Manzoor Ahmad, Manuel Munier, Laurent Gallon, and Jean-Michel Bruel. "Using Relax Operators into an MDE Security Requirement Elicitation Process for Systems of Systems." In the 2014 European Conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/2642803.2642835.
Full textAmin, Md Rayhan, and Tanmay Bhowmik. "Existing Vulnerability Information in Security Requirements Elicitation." In 2022 IEEE 30th International Requirements Engineering Conference Workshops (REW). IEEE, 2022. http://dx.doi.org/10.1109/rew56159.2022.00049.
Full textRabii, Anass, Saliha Assoul, and Ounsa Roudies. "Security requirements elicitation: A smart health case." In 2020 Fourth World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4). IEEE, 2020. http://dx.doi.org/10.1109/worlds450073.2020.9210330.
Full textGoel, Rajat, M. C. Govil, and Girdhari Singh. "Security Requirements Elicitation and Assessment Mechanism (SecREAM)." In 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2015. http://dx.doi.org/10.1109/icacci.2015.7275889.
Full textLindvall, Mikael, Madeline Diep, Michele Klein, Paul Jones, Yi Zhang, and Eugene Vasserman. "Safety-Focused Security Requirements Elicitation for Medical Device Software." In 2017 IEEE 25th International Requirements Engineering Conference (RE). IEEE, 2017. http://dx.doi.org/10.1109/re.2017.21.
Full textIonita, Dan, Jan-Willem Bullee, and Roel J. Wieringa. "Argumentation-based security requirements elicitation: The next round." In 2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). IEEE, 2014. http://dx.doi.org/10.1109/espre.2014.6890521.
Full textBeckers, Kristian, Maritta Heisel, Isabelle Cote, Ludger Goeke, and Selim Guler. "Structured Pattern-Based Security Requirements Elicitation for Clouds." In 2013 Eighth International Conference on Availability, Reliability and Security (ARES). IEEE, 2013. http://dx.doi.org/10.1109/ares.2013.61.
Full textWilliams, Imano. "An Ontology Based Collaborative Recommender System for Security Requirements Elicitation." In 2018 IEEE 26th International Requirements Engineering Conference (RE). IEEE, 2018. http://dx.doi.org/10.1109/re.2018.00060.
Full textAl-Zawahreh, Hanan, and Khaled Almakadmeh. "Procedural Model of Requirements Elicitation Techniques." In IPAC '15: International Conference on Intelligent Information Processing, Security and Advanced Communication. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2816839.2816902.
Full text