Journal articles on the topic 'Security Requirement Elicitation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 40 journal articles for your research on the topic 'Security Requirement Elicitation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
GUTIERREZ, C., E. FERNANDEZ-MEDINA, and M. PIATTINI. "Web Services-Based Security Requirement Elicitation." IEICE Transactions on Information and Systems E90-D, no. 9 (September 1, 2007): 1374–87. http://dx.doi.org/10.1093/ietisy/e90-d.9.1374.
Full textKumar, B. Sathis. "EVALUATION OF CAPTURING ARCHITECTURALLY SIGNIFICANT REQUIREMENTS." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 122. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19589.
Full textKumar, Devendra, Anil Kumar, and Laxman Singh. "Non-functional Requirements Elicitation in Agile Base Models." Webology 19, no. 1 (January 20, 2022): 1992–2018. http://dx.doi.org/10.14704/web/v19i1/web19135.
Full textBeckers, Kristian, Isabelle Côté, Ludger Goeke, Selim Güler, and Maritta Heisel. "A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain." International Journal of Secure Software Engineering 5, no. 2 (April 2014): 20–43. http://dx.doi.org/10.4018/ijsse.2014040102.
Full textRehman, Shafiq, and Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems." Technologies 6, no. 3 (July 12, 2018): 65. http://dx.doi.org/10.3390/technologies6030065.
Full textFaroom, Saeed. "A Review of Requirement Engineering Process Models, Tools & Methodologies." International Journal of Energetica 4, no. 1 (June 30, 2019): 44. http://dx.doi.org/10.47238/ijeca.v4i1.86.
Full textVegendla, Aparna, Anh Nguyen Duc, Shang Gao, and Guttorm Sindre. "A Systematic Mapping Study on Requirements Engineering in Software Ecosystems." Journal of Information Technology Research 11, no. 1 (January 2018): 49–69. http://dx.doi.org/10.4018/jitr.2018010104.
Full textISSA, ATOUM. "REQUIREMENTS ELICITATION APPROACH FOR CYBER SECURITY SYSTEMS." i-manager’s Journal on Software Engineering 10, no. 3 (2016): 1. http://dx.doi.org/10.26634/jse.10.3.4898.
Full textMatulevičius, Raimundas, Alex Norta, and Silver Samarütel. "Security Requirements Elicitation from Airline Turnaround Processes." Business & Information Systems Engineering 60, no. 1 (January 15, 2018): 3–20. http://dx.doi.org/10.1007/s12599-018-0518-4.
Full textSchmitt, Christian, and Peter Liggesmeyer. "Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources." Complex Systems Informatics and Modeling Quarterly, no. 3 (July 30, 2015): 15–34. http://dx.doi.org/10.7250/csimq.2015-3.02.
Full textKavallieratos, Georgios, Sokratis Katsikas, and Vasileios Gkioulos. "SafeSec Tropos: Joint security and safety requirements elicitation." Computer Standards & Interfaces 70 (June 2020): 103429. http://dx.doi.org/10.1016/j.csi.2020.103429.
Full textSAEKI, MOTOSHI, SHINPEI HAYASHI, and HARUHIKO KAIYA. "ENHANCING GOAL-ORIENTED SECURITY REQUIREMENTS ANALYSIS USING COMMON CRITERIA-BASED KNOWLEDGE." International Journal of Software Engineering and Knowledge Engineering 23, no. 05 (June 2013): 695–720. http://dx.doi.org/10.1142/s0218194013500174.
Full textFoley, Simon N., and Vivien Rooney. "A grounded theory approach to security policy elicitation." Information & Computer Security 26, no. 4 (October 8, 2018): 454–71. http://dx.doi.org/10.1108/ics-12-2017-0086.
Full textWeber, Stefan G., and Prima Gustiené. "Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles." International Journal of Information Systems for Crisis Response and Management 5, no. 2 (April 2013): 1–18. http://dx.doi.org/10.4018/jiscrm.2013040101.
Full textRaspotnig, Christian, Peter Karpati, and Andreas L. Opdahl. "Combined Assessment of Software Safety and Security Requirements." Journal of Cases on Information Technology 20, no. 1 (January 2018): 46–69. http://dx.doi.org/10.4018/jcit.2018010104.
Full textSaikayasit, Rose, Alex W. Stedmon, and Glyn Lawson. "User Requirements Elicitation in Security and Counter-Terrorism: A Human Factors Approach." Journal of Police and Criminal Psychology 28, no. 2 (June 19, 2013): 162–70. http://dx.doi.org/10.1007/s11896-013-9129-7.
Full textArogundade, O. T., A. T. Akinwale, Z. Jin, and X. G. Yang. "A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements." International Journal of Information Security and Privacy 5, no. 4 (October 2011): 8–30. http://dx.doi.org/10.4018/jisp.2011100102.
Full textAndrade, Roberto, Jenny Torres, Iván Ortiz-Garcés, Jorge Miño, and Luis Almeida. "An Exploratory Study Gathering Security Requirements for the Software Development Process." Electronics 12, no. 17 (August 25, 2023): 3594. http://dx.doi.org/10.3390/electronics12173594.
Full textFaily, Shamal. "Engaging stakeholders during late stage security design with assumption personas." Information & Computer Security 23, no. 4 (October 12, 2015): 435–46. http://dx.doi.org/10.1108/ics-10-2014-0066.
Full textZareen, Saima, Adeel Akram, and Shoab Ahmad Khan. "Security Requirements Engineering Framework with BPMN 2.0.2 Extension Model for Development of Information Systems." Applied Sciences 10, no. 14 (July 20, 2020): 4981. http://dx.doi.org/10.3390/app10144981.
Full textKalloniatis, Christos, Costas Lambrinoudakis, Mathias Musahl, Athanasios Kanatas, and Stefanos Gritzalis. "Incorporating privacy by design in body sensor networks for medical applications: A privacy and data protection framework." Computer Science and Information Systems, no. 00 (2020): 57. http://dx.doi.org/10.2298/csis200922057k.
Full textAdee, Rose, and Haralambos Mouratidis. "A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography." Sensors 22, no. 3 (February 1, 2022): 1109. http://dx.doi.org/10.3390/s22031109.
Full textArgyropoulos, Nikolaos, Konstantinos Angelopoulos, Haralambos Mouratidis, and Andrew Fish. "Risk-aware decision support with constrained goal models." Information & Computer Security 26, no. 4 (October 8, 2018): 472–90. http://dx.doi.org/10.1108/ics-01-2018-0010.
Full textTsohou, Aggeliki, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, and Beatriz Gallego-Nicasio Crespo. "Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform." Information & Computer Security 28, no. 4 (April 16, 2020): 531–53. http://dx.doi.org/10.1108/ics-01-2020-0002.
Full textMarques, Johnny, and Adilson Marques da Cunha. "ARES: An Agile Requirements Specification Process for Regulated Environments." International Journal of Software Engineering and Knowledge Engineering 29, no. 10 (October 2019): 1403–38. http://dx.doi.org/10.1142/s021819401950044x.
Full textGhufron, Kharisma Muzaki, Wahyu Andhyka Kusuma, and Fauzan Fauzan. "PENGGUNAAN USER PERSONA UNTUK EVALUASI DAN MENINGKATKAN EKSPEKTASI PENGGUNA DALAM KEBUTUHAN SISTEM INFORMASI AKADEMIK." SINTECH (Science and Information Technology) Journal 3, no. 2 (October 28, 2020): 90–99. http://dx.doi.org/10.31598/sintechjournal.v3i2.587.
Full textCALVANESE, DIEGO, MARCO MONTALI, MARLON DUMAS, and FABRIZIO M. MAGGI. "Semantic DMN: Formalizing and Reasoning About Decisions in the Presence of Background Knowledge." Theory and Practice of Logic Programming 19, no. 04 (January 18, 2019): 536–73. http://dx.doi.org/10.1017/s1471068418000479.
Full textVargas, Cyntia, Jens Bürger, Fabien Viertel, Birgit Vogel-Heuser, and Jan Jürjens. "System evolution through semi-automatic elicitation of security requirements: A Position Paper ⁎ ⁎Research supported by the DFG (German Research Foundation) in Priority Programme SPP1593: Design for Future - Managed Software Evolution (VO 937/20-2 and JU 2734/2-2)." IFAC-PapersOnLine 51, no. 10 (2018): 64–69. http://dx.doi.org/10.1016/j.ifacol.2018.06.238.
Full textMajore, Ginta. "ENTERPRISE MODELLING METHODOLOGY FOR SOCIO-CYBER-PHYSICAL SYSTEMS DESIGN: CASE FROM CYBERSECURITY EDUCATION AND CLIMATE-SMART AGRICULTURE." SOCIETY. TECHNOLOGY. SOLUTIONS. Proceedings of the International Scientific Conference 2 (April 8, 2022): 4. http://dx.doi.org/10.35363/via.sts.2022.74.
Full textMajore, Ginta. "ENTERPRISE MODELLING METHODOLOGY FOR SOCIO-CYBER-PHYSICAL SYSTEMS DESIGN: CASE FROM CYBERSECURITY EDUCATION AND CLIMATE-SMART AGRICULTURE." SOCIETY. TECHNOLOGY. SOLUTIONS. Proceedings of the International Scientific Conference 2 (April 8, 2022): 4. http://dx.doi.org/10.35363/via.sts.2022.74.
Full text"Quantitative Analysis of Requirement Elicitation Techniques through FANP: Security Perspective." International Journal of Recent Technology and Engineering 8, no. 5 (January 30, 2020): 3550–58. http://dx.doi.org/10.35940/ijrte.e6402.018520.
Full text"Optimizing the Impact of Security Attributes in Requirement Elicitation Techniques using FAHP." International Journal of Innovative Technology and Exploring Engineering 9, no. 4 (February 10, 2020): 1656–61. http://dx.doi.org/10.35940/ijitee.d1213.029420.
Full text"Detection of Vulnerability Injection Point in Software Development Lifecycle for Effective Countermeasures." International Journal of Engineering and Advanced Technology 9, no. 3 (February 29, 2020): 2715–21. http://dx.doi.org/10.35940/ijeat.c6045.029320.
Full textMatulevičius, Raimundas, and Naved Ahmed. "Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns." it – Information Technology 55, no. 6 (January 1, 2013). http://dx.doi.org/10.1515/itit.2013.2002.
Full text"Secure MEReq: A Tool Support to Check for Completeness of Security Requirements." International Journal of Recent Technology and Engineering 8, no. 2S11 (November 2, 2019): 768–71. http://dx.doi.org/10.35940/ijrte.b1125.0982s1119.
Full textHibshi, Hanan, Stephanie Jones, and Travis Breaux. "A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements." IEEE Transactions on Dependable and Secure Computing, 2021, 1. http://dx.doi.org/10.1109/tdsc.2021.3103109.
Full textSaleh, Emam, and Fahd ElShahrani. "Extracting Functional and Non-Functional Requirements for E-learning Systems." International Journal of Educational Sciences and Arts 2, no. 5 (2023). http://dx.doi.org/10.59992/ijesa.2023.v2n5p3.
Full textDaun, Marian, Alicia M. Grubb, Viktoria Stenkova, and Bastian Tenbergen. "A systematic literature review of requirements engineering education." Requirements Engineering, May 19, 2022. http://dx.doi.org/10.1007/s00766-022-00381-9.
Full textBagriyanik, Selami, and Adem Karahoca. "Big data in software engineering: A systematic literature review." Global Journal of Information Technology 6, no. 1 (March 15, 2016). http://dx.doi.org/10.18844/gjit.v6i1.397.
Full textTemate-Tiagueu, Yvette, Joseph Amlung, Dennis Stover, Philip Peters, John T. Brooks, Sridhar Papagari Sangareddy, Jina J. Dcruz, and Kamran Ahmed. "Dashboard Prototype for Improved HIV Monitoring and Reporting for Indiana." Online Journal of Public Health Informatics 11, no. 1 (May 30, 2019). http://dx.doi.org/10.5210/ojphi.v11i1.9699.
Full text