Добірка наукової літератури з теми "Security Requirement Elicitation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security Requirement Elicitation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security Requirement Elicitation"
GUTIERREZ, C., E. FERNANDEZ-MEDINA, and M. PIATTINI. "Web Services-Based Security Requirement Elicitation." IEICE Transactions on Information and Systems E90-D, no. 9 (September 1, 2007): 1374–87. http://dx.doi.org/10.1093/ietisy/e90-d.9.1374.
Повний текст джерелаKumar, B. Sathis. "EVALUATION OF CAPTURING ARCHITECTURALLY SIGNIFICANT REQUIREMENTS." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 122. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19589.
Повний текст джерелаKumar, Devendra, Anil Kumar, and Laxman Singh. "Non-functional Requirements Elicitation in Agile Base Models." Webology 19, no. 1 (January 20, 2022): 1992–2018. http://dx.doi.org/10.14704/web/v19i1/web19135.
Повний текст джерелаBeckers, Kristian, Isabelle Côté, Ludger Goeke, Selim Güler, and Maritta Heisel. "A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain." International Journal of Secure Software Engineering 5, no. 2 (April 2014): 20–43. http://dx.doi.org/10.4018/ijsse.2014040102.
Повний текст джерелаRehman, Shafiq, and Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems." Technologies 6, no. 3 (July 12, 2018): 65. http://dx.doi.org/10.3390/technologies6030065.
Повний текст джерелаFaroom, Saeed. "A Review of Requirement Engineering Process Models, Tools & Methodologies." International Journal of Energetica 4, no. 1 (June 30, 2019): 44. http://dx.doi.org/10.47238/ijeca.v4i1.86.
Повний текст джерелаVegendla, Aparna, Anh Nguyen Duc, Shang Gao, and Guttorm Sindre. "A Systematic Mapping Study on Requirements Engineering in Software Ecosystems." Journal of Information Technology Research 11, no. 1 (January 2018): 49–69. http://dx.doi.org/10.4018/jitr.2018010104.
Повний текст джерелаISSA, ATOUM. "REQUIREMENTS ELICITATION APPROACH FOR CYBER SECURITY SYSTEMS." i-manager’s Journal on Software Engineering 10, no. 3 (2016): 1. http://dx.doi.org/10.26634/jse.10.3.4898.
Повний текст джерелаMatulevičius, Raimundas, Alex Norta, and Silver Samarütel. "Security Requirements Elicitation from Airline Turnaround Processes." Business & Information Systems Engineering 60, no. 1 (January 15, 2018): 3–20. http://dx.doi.org/10.1007/s12599-018-0518-4.
Повний текст джерелаSchmitt, Christian, and Peter Liggesmeyer. "Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources." Complex Systems Informatics and Modeling Quarterly, no. 3 (July 30, 2015): 15–34. http://dx.doi.org/10.7250/csimq.2015-3.02.
Повний текст джерелаДисертації з теми "Security Requirement Elicitation"
Islam, Gibrail, and Murtaza Ali Qureshi. "A Framework for Security Requirements Elicitation." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3448.
Повний текст джерелаBogale, Helen Yeshiwas, and Zohaib Ahmed. "A Framework for Security Requirements : Security Requirements Categorization and Misuse Cases." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5896.
Повний текст джерелаSäkerhet Kravhantering är nödvändigt för att uppnå säkra programvarusystem. Många tekniker och metoder har föreslagits för att framkalla säkerhetskraven i de inledande faserna i utvecklingen. Med den växande betydelsen av säkerhet och enorma ökning av brott mot säkerheten under de senaste åren har forskare och praktiker strävat efter att uppnå en mogen process för att klara säkerhetskraven. Mycket av verksamheten i detta avseende ses i den akademiska världen, men industrin fortfarande tycks saknas i att ge den nödvändiga betydelse för säkerheten kravhantering. Därför är säkerheten kravhantering fortfarande inte alltid som en central del av kravhantering. Denna studie är inriktad att överbrygga denna klyfta mellan akademi och näringsliv när det gäller säkerhet kravhantering och att ge en konkret strategi för att effektivt få fram och specificera säkerhetskrav. Missbruk fallet tekniken föreslås för detta ändamål. Men det saknar i att ge riktlinjer för att möjliggöra skalbar användning. Denna begränsning har åtgärdats för att uppnå en mogen process av säkerhetskrav elicitation.
+46 (0) 735 84 12 97, +46 (0) 760 60 96 55
ROCHA, Simara Vieira da. "ELICITAÇÃO DE REQUISITOS BASEADA EM OBJETIVOS PARA POLÍTICAS DE SEGURANÇA E PRIVACIDADE EM COMÉRCIO ELETRÔNICO." Universidade Federal do Maranhão, 2005. http://tedebc.ufma.br:8080/jspui/handle/tede/395.
Повний текст джерелаThis work describes a method for the elicitation of requirements based on goals for electronic commerce systems in agreement with security and privacy polices of a site. The method integrates the UWA approach [33] with the GBRAM method [6] for developing requirements and policies for secure electronic commerce systems. The resulting method aims to guarantee that existent security and privacy policies do not become obsolete after the adoption of new functionalities to a site. For this reason, the method provides means to set the elicited requirements in conformity with these new functionalities. On the other hand, organizations that have not established their policies yet, the proposed approach suggests some models through which it is possible to create such policies. At last, the proposed method presents a model for the document of requirements specification in agreement with the approach described in this work, as way of establishing a standard means to specify software requirements that can be as useful for the developing teams, in the attempt of facilitating the construction of systems, as for the analyzing teams, in the future maintenances or increment of functionalities to a site.
Este trabalho descreve um método para elicitação de requisitos baseado em objetivos para sistemas de comércio eletrônico, em conformidade com as políticas de segurança e privacidade existentes em um site. O método é originado pela integração das abordagens UWA [33] com a instanciação do método GBRAM [6] para o desenvolvimento de políticas e requisitos de sistemas de comércio eletrônicos seguros. O método resultante tem por objetivo garantir que as políticas de segurança e privacidade existentes nunca se tornem obsoletas com a adoção de novas funcionalidades a um site. Para tanto, provê meios para que os requisitos elicitados estejam em conformidade com as mesmas. Por outro lado, caso as organizações não tenham estabelecido suas políticas, a abordagem proposta sugere modelos através dos quais é possível a criação de tais políticas. Por fim, o método proposto ainda apresenta um modelo para o documento de especificação de requisitos, como forma de estabelecer um meio padrão para especificar requisitos de software, o qual poderá ser útil tanto para as equipes de desenvolvimento, na tentativa de facilitar a construção de sistemas, quanto para as equipes de análises, nas futuras manutenções ou acréscimo de funcionalidades ao site.
Soni, Krishna Chandra. "Designing Security Requirement Solutions Using Back Tracking Approach." Thesis, 2015. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14316.
Повний текст джерелаShalender Kumar Verma
Частини книг з теми "Security Requirement Elicitation"
Kirikova, Marite, Raimundas Matulevičius, and Kurt Sandkuhl. "The Enterprise Model Frame for Supporting Security Requirement Elicitation from Business Processes." In Communications in Computer and Information Science, 229–41. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40180-5_16.
Повний текст джерелаRodríguez, Alfonso, Eduardo Fernández-Medina, and Mario Piattini. "M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification." In Advances in Conceptual Modeling – Foundations and Applications, 106–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-76292-8_13.
Повний текст джерелаSouag, Amina, Camille Salinesi, Raúl Mazo, and Isabelle Comyn-Wattiau. "A Security Ontology for Security Requirements Elicitation." In Lecture Notes in Computer Science, 157–77. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15618-7_13.
Повний текст джерелаGoel, Rajat, Mahesh Chandra Govil, and Girdhari Singh. "Security Requirements Elicitation and Modeling Authorizations." In Communications in Computer and Information Science, 239–50. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2738-3_20.
Повний текст джерелаGhiran, Ana-Maria, Robert Andrei Buchmann, and Cristina-Claudia Osman. "Security Requirements Elicitation from Engineering Governance, Risk Management and Compliance." In Requirements Engineering: Foundation for Software Quality, 283–89. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77243-1_17.
Повний текст джерелаAlwidian, Sanaa, and Jason Jaskolka. "Understanding the Role of Human-Related Factors in Security Requirements Elicitation." In Requirements Engineering: Foundation for Software Quality, 65–74. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-29786-1_5.
Повний текст джерелаSaeki, Motoshi, and Haruhiko Kaiya. "Security Requirements Elicitation Using Method Weaving and Common Criteria." In Models in Software Engineering, 185–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01648-6_20.
Повний текст джерелаMakri, Eleni-Laskarina, and Costas Lambrinoudakis. "Towards a Common Security and Privacy Requirements Elicitation Methodology." In Communications in Computer and Information Science, 151–59. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23276-8_13.
Повний текст джерелаFaßbender, Stephan, Maritta Heisel, and Rene Meis. "Problem-Based Security Requirements Elicitation and Refinement with PresSuRE." In Communications in Computer and Information Science, 311–30. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25579-8_18.
Повний текст джерелаKim, Seung-Jun, and Seok-Won Lee. "Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats." In Communications in Computer and Information Science, 29–40. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7796-8_3.
Повний текст джерелаТези доповідей конференцій з теми "Security Requirement Elicitation"
Ikram, Naveed, Surayya Siddiqui, and Naurin Farooq Khan. "Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems." In 2014 IEEE Fourth International Workshop on Empirical Requirements Engineering (EmpiRE). IEEE, 2014. http://dx.doi.org/10.1109/empire.2014.6890114.
Повний текст джерелаBelloir, Nicolas, Vanea Chiprianov, Manzoor Ahmad, Manuel Munier, Laurent Gallon, and Jean-Michel Bruel. "Using Relax Operators into an MDE Security Requirement Elicitation Process for Systems of Systems." In the 2014 European Conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/2642803.2642835.
Повний текст джерелаAmin, Md Rayhan, and Tanmay Bhowmik. "Existing Vulnerability Information in Security Requirements Elicitation." In 2022 IEEE 30th International Requirements Engineering Conference Workshops (REW). IEEE, 2022. http://dx.doi.org/10.1109/rew56159.2022.00049.
Повний текст джерелаRabii, Anass, Saliha Assoul, and Ounsa Roudies. "Security requirements elicitation: A smart health case." In 2020 Fourth World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4). IEEE, 2020. http://dx.doi.org/10.1109/worlds450073.2020.9210330.
Повний текст джерелаGoel, Rajat, M. C. Govil, and Girdhari Singh. "Security Requirements Elicitation and Assessment Mechanism (SecREAM)." In 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2015. http://dx.doi.org/10.1109/icacci.2015.7275889.
Повний текст джерелаLindvall, Mikael, Madeline Diep, Michele Klein, Paul Jones, Yi Zhang, and Eugene Vasserman. "Safety-Focused Security Requirements Elicitation for Medical Device Software." In 2017 IEEE 25th International Requirements Engineering Conference (RE). IEEE, 2017. http://dx.doi.org/10.1109/re.2017.21.
Повний текст джерелаIonita, Dan, Jan-Willem Bullee, and Roel J. Wieringa. "Argumentation-based security requirements elicitation: The next round." In 2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). IEEE, 2014. http://dx.doi.org/10.1109/espre.2014.6890521.
Повний текст джерелаBeckers, Kristian, Maritta Heisel, Isabelle Cote, Ludger Goeke, and Selim Guler. "Structured Pattern-Based Security Requirements Elicitation for Clouds." In 2013 Eighth International Conference on Availability, Reliability and Security (ARES). IEEE, 2013. http://dx.doi.org/10.1109/ares.2013.61.
Повний текст джерелаWilliams, Imano. "An Ontology Based Collaborative Recommender System for Security Requirements Elicitation." In 2018 IEEE 26th International Requirements Engineering Conference (RE). IEEE, 2018. http://dx.doi.org/10.1109/re.2018.00060.
Повний текст джерелаAl-Zawahreh, Hanan, and Khaled Almakadmeh. "Procedural Model of Requirements Elicitation Techniques." In IPAC '15: International Conference on Intelligent Information Processing, Security and Advanced Communication. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2816839.2816902.
Повний текст джерела