Gotowa bibliografia na temat „Security Requirement Elicitation”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Security Requirement Elicitation”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Security Requirement Elicitation"
GUTIERREZ, C., E. FERNANDEZ-MEDINA i M. PIATTINI. "Web Services-Based Security Requirement Elicitation". IEICE Transactions on Information and Systems E90-D, nr 9 (1.09.2007): 1374–87. http://dx.doi.org/10.1093/ietisy/e90-d.9.1374.
Pełny tekst źródłaKumar, B. Sathis. "EVALUATION OF CAPTURING ARCHITECTURALLY SIGNIFICANT REQUIREMENTS". Asian Journal of Pharmaceutical and Clinical Research 10, nr 13 (1.04.2017): 122. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19589.
Pełny tekst źródłaKumar, Devendra, Anil Kumar i Laxman Singh. "Non-functional Requirements Elicitation in Agile Base Models". Webology 19, nr 1 (20.01.2022): 1992–2018. http://dx.doi.org/10.14704/web/v19i1/web19135.
Pełny tekst źródłaBeckers, Kristian, Isabelle Côté, Ludger Goeke, Selim Güler i Maritta Heisel. "A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain". International Journal of Secure Software Engineering 5, nr 2 (kwiecień 2014): 20–43. http://dx.doi.org/10.4018/ijsse.2014040102.
Pełny tekst źródłaRehman, Shafiq, i Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems". Technologies 6, nr 3 (12.07.2018): 65. http://dx.doi.org/10.3390/technologies6030065.
Pełny tekst źródłaFaroom, Saeed. "A Review of Requirement Engineering Process Models, Tools & Methodologies". International Journal of Energetica 4, nr 1 (30.06.2019): 44. http://dx.doi.org/10.47238/ijeca.v4i1.86.
Pełny tekst źródłaVegendla, Aparna, Anh Nguyen Duc, Shang Gao i Guttorm Sindre. "A Systematic Mapping Study on Requirements Engineering in Software Ecosystems". Journal of Information Technology Research 11, nr 1 (styczeń 2018): 49–69. http://dx.doi.org/10.4018/jitr.2018010104.
Pełny tekst źródłaISSA, ATOUM. "REQUIREMENTS ELICITATION APPROACH FOR CYBER SECURITY SYSTEMS". i-manager’s Journal on Software Engineering 10, nr 3 (2016): 1. http://dx.doi.org/10.26634/jse.10.3.4898.
Pełny tekst źródłaMatulevičius, Raimundas, Alex Norta i Silver Samarütel. "Security Requirements Elicitation from Airline Turnaround Processes". Business & Information Systems Engineering 60, nr 1 (15.01.2018): 3–20. http://dx.doi.org/10.1007/s12599-018-0518-4.
Pełny tekst źródłaSchmitt, Christian, i Peter Liggesmeyer. "Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources". Complex Systems Informatics and Modeling Quarterly, nr 3 (30.07.2015): 15–34. http://dx.doi.org/10.7250/csimq.2015-3.02.
Pełny tekst źródłaRozprawy doktorskie na temat "Security Requirement Elicitation"
Islam, Gibrail, i Murtaza Ali Qureshi. "A Framework for Security Requirements Elicitation". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3448.
Pełny tekst źródłaBogale, Helen Yeshiwas, i Zohaib Ahmed. "A Framework for Security Requirements : Security Requirements Categorization and Misuse Cases". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5896.
Pełny tekst źródłaSäkerhet Kravhantering är nödvändigt för att uppnå säkra programvarusystem. Många tekniker och metoder har föreslagits för att framkalla säkerhetskraven i de inledande faserna i utvecklingen. Med den växande betydelsen av säkerhet och enorma ökning av brott mot säkerheten under de senaste åren har forskare och praktiker strävat efter att uppnå en mogen process för att klara säkerhetskraven. Mycket av verksamheten i detta avseende ses i den akademiska världen, men industrin fortfarande tycks saknas i att ge den nödvändiga betydelse för säkerheten kravhantering. Därför är säkerheten kravhantering fortfarande inte alltid som en central del av kravhantering. Denna studie är inriktad att överbrygga denna klyfta mellan akademi och näringsliv när det gäller säkerhet kravhantering och att ge en konkret strategi för att effektivt få fram och specificera säkerhetskrav. Missbruk fallet tekniken föreslås för detta ändamål. Men det saknar i att ge riktlinjer för att möjliggöra skalbar användning. Denna begränsning har åtgärdats för att uppnå en mogen process av säkerhetskrav elicitation.
+46 (0) 735 84 12 97, +46 (0) 760 60 96 55
ROCHA, Simara Vieira da. "ELICITAÇÃO DE REQUISITOS BASEADA EM OBJETIVOS PARA POLÍTICAS DE SEGURANÇA E PRIVACIDADE EM COMÉRCIO ELETRÔNICO". Universidade Federal do Maranhão, 2005. http://tedebc.ufma.br:8080/jspui/handle/tede/395.
Pełny tekst źródłaThis work describes a method for the elicitation of requirements based on goals for electronic commerce systems in agreement with security and privacy polices of a site. The method integrates the UWA approach [33] with the GBRAM method [6] for developing requirements and policies for secure electronic commerce systems. The resulting method aims to guarantee that existent security and privacy policies do not become obsolete after the adoption of new functionalities to a site. For this reason, the method provides means to set the elicited requirements in conformity with these new functionalities. On the other hand, organizations that have not established their policies yet, the proposed approach suggests some models through which it is possible to create such policies. At last, the proposed method presents a model for the document of requirements specification in agreement with the approach described in this work, as way of establishing a standard means to specify software requirements that can be as useful for the developing teams, in the attempt of facilitating the construction of systems, as for the analyzing teams, in the future maintenances or increment of functionalities to a site.
Este trabalho descreve um método para elicitação de requisitos baseado em objetivos para sistemas de comércio eletrônico, em conformidade com as políticas de segurança e privacidade existentes em um site. O método é originado pela integração das abordagens UWA [33] com a instanciação do método GBRAM [6] para o desenvolvimento de políticas e requisitos de sistemas de comércio eletrônicos seguros. O método resultante tem por objetivo garantir que as políticas de segurança e privacidade existentes nunca se tornem obsoletas com a adoção de novas funcionalidades a um site. Para tanto, provê meios para que os requisitos elicitados estejam em conformidade com as mesmas. Por outro lado, caso as organizações não tenham estabelecido suas políticas, a abordagem proposta sugere modelos através dos quais é possível a criação de tais políticas. Por fim, o método proposto ainda apresenta um modelo para o documento de especificação de requisitos, como forma de estabelecer um meio padrão para especificar requisitos de software, o qual poderá ser útil tanto para as equipes de desenvolvimento, na tentativa de facilitar a construção de sistemas, quanto para as equipes de análises, nas futuras manutenções ou acréscimo de funcionalidades ao site.
Soni, Krishna Chandra. "Designing Security Requirement Solutions Using Back Tracking Approach". Thesis, 2015. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14316.
Pełny tekst źródłaShalender Kumar Verma
Części książek na temat "Security Requirement Elicitation"
Kirikova, Marite, Raimundas Matulevičius i Kurt Sandkuhl. "The Enterprise Model Frame for Supporting Security Requirement Elicitation from Business Processes". W Communications in Computer and Information Science, 229–41. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40180-5_16.
Pełny tekst źródłaRodríguez, Alfonso, Eduardo Fernández-Medina i Mario Piattini. "M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification". W Advances in Conceptual Modeling – Foundations and Applications, 106–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-76292-8_13.
Pełny tekst źródłaSouag, Amina, Camille Salinesi, Raúl Mazo i Isabelle Comyn-Wattiau. "A Security Ontology for Security Requirements Elicitation". W Lecture Notes in Computer Science, 157–77. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15618-7_13.
Pełny tekst źródłaGoel, Rajat, Mahesh Chandra Govil i Girdhari Singh. "Security Requirements Elicitation and Modeling Authorizations". W Communications in Computer and Information Science, 239–50. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2738-3_20.
Pełny tekst źródłaGhiran, Ana-Maria, Robert Andrei Buchmann i Cristina-Claudia Osman. "Security Requirements Elicitation from Engineering Governance, Risk Management and Compliance". W Requirements Engineering: Foundation for Software Quality, 283–89. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77243-1_17.
Pełny tekst źródłaAlwidian, Sanaa, i Jason Jaskolka. "Understanding the Role of Human-Related Factors in Security Requirements Elicitation". W Requirements Engineering: Foundation for Software Quality, 65–74. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-29786-1_5.
Pełny tekst źródłaSaeki, Motoshi, i Haruhiko Kaiya. "Security Requirements Elicitation Using Method Weaving and Common Criteria". W Models in Software Engineering, 185–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01648-6_20.
Pełny tekst źródłaMakri, Eleni-Laskarina, i Costas Lambrinoudakis. "Towards a Common Security and Privacy Requirements Elicitation Methodology". W Communications in Computer and Information Science, 151–59. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23276-8_13.
Pełny tekst źródłaFaßbender, Stephan, Maritta Heisel i Rene Meis. "Problem-Based Security Requirements Elicitation and Refinement with PresSuRE". W Communications in Computer and Information Science, 311–30. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25579-8_18.
Pełny tekst źródłaKim, Seung-Jun, i Seok-Won Lee. "Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats". W Communications in Computer and Information Science, 29–40. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7796-8_3.
Pełny tekst źródłaStreszczenia konferencji na temat "Security Requirement Elicitation"
Ikram, Naveed, Surayya Siddiqui i Naurin Farooq Khan. "Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems". W 2014 IEEE Fourth International Workshop on Empirical Requirements Engineering (EmpiRE). IEEE, 2014. http://dx.doi.org/10.1109/empire.2014.6890114.
Pełny tekst źródłaBelloir, Nicolas, Vanea Chiprianov, Manzoor Ahmad, Manuel Munier, Laurent Gallon i Jean-Michel Bruel. "Using Relax Operators into an MDE Security Requirement Elicitation Process for Systems of Systems". W the 2014 European Conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/2642803.2642835.
Pełny tekst źródłaAmin, Md Rayhan, i Tanmay Bhowmik. "Existing Vulnerability Information in Security Requirements Elicitation". W 2022 IEEE 30th International Requirements Engineering Conference Workshops (REW). IEEE, 2022. http://dx.doi.org/10.1109/rew56159.2022.00049.
Pełny tekst źródłaRabii, Anass, Saliha Assoul i Ounsa Roudies. "Security requirements elicitation: A smart health case". W 2020 Fourth World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4). IEEE, 2020. http://dx.doi.org/10.1109/worlds450073.2020.9210330.
Pełny tekst źródłaGoel, Rajat, M. C. Govil i Girdhari Singh. "Security Requirements Elicitation and Assessment Mechanism (SecREAM)". W 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2015. http://dx.doi.org/10.1109/icacci.2015.7275889.
Pełny tekst źródłaLindvall, Mikael, Madeline Diep, Michele Klein, Paul Jones, Yi Zhang i Eugene Vasserman. "Safety-Focused Security Requirements Elicitation for Medical Device Software". W 2017 IEEE 25th International Requirements Engineering Conference (RE). IEEE, 2017. http://dx.doi.org/10.1109/re.2017.21.
Pełny tekst źródłaIonita, Dan, Jan-Willem Bullee i Roel J. Wieringa. "Argumentation-based security requirements elicitation: The next round". W 2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). IEEE, 2014. http://dx.doi.org/10.1109/espre.2014.6890521.
Pełny tekst źródłaBeckers, Kristian, Maritta Heisel, Isabelle Cote, Ludger Goeke i Selim Guler. "Structured Pattern-Based Security Requirements Elicitation for Clouds". W 2013 Eighth International Conference on Availability, Reliability and Security (ARES). IEEE, 2013. http://dx.doi.org/10.1109/ares.2013.61.
Pełny tekst źródłaWilliams, Imano. "An Ontology Based Collaborative Recommender System for Security Requirements Elicitation". W 2018 IEEE 26th International Requirements Engineering Conference (RE). IEEE, 2018. http://dx.doi.org/10.1109/re.2018.00060.
Pełny tekst źródłaAl-Zawahreh, Hanan, i Khaled Almakadmeh. "Procedural Model of Requirements Elicitation Techniques". W IPAC '15: International Conference on Intelligent Information Processing, Security and Advanced Communication. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2816839.2816902.
Pełny tekst źródła