A security ontology for security requirements elicitation

A Souag, C Salinesi, R Mazo… - … Secure Software and …, 2015 - Springer
… the IS security requirements elicitation and analysis process. The completeness of this
ontology was evaluated with regards to existing security ontologies used in security requirements

Security Requirements Elicitation Using View Points for Online System

A Agarwal, D Gupta - … on Emerging Trends in Engineering and …, 2008 - ieeexplore.ieee.org
… are and he/she is able to distinguish security requirements from various architectural and …
for security requirements elicitation presenting techniques for activities like requirements

Requirements elicitation: Issues and challenges

S Sharma, SK Pandey - 2014 international conference on …, 2014 - ieeexplore.ieee.org
requirements elicitation goals [3]. In this paper, a comprehensive analysis of state-of-the-art
techniques and practice of requirements elicitation … may arise during requirements elicitation. …

[PDF][PDF] Problem-based Elicitation of Security Requirements

R Wirtz, M Heisel, R Meis, A Omerovic… - Proceedings of the 13th …, 2018 - scitepress.org
Eliciting security requirements should be done in a systematic way. We propse a method to
elicit security requirements that … Riskrep: Risk-based security requirements elicitation and …

A structured method for security requirements elicitation concerning the cloud computing domain

K Beckers, I Côté, L Goeke, S Güler… - International Journal of …, 2014 - igi-global.com
… -based method supporting eliciting security requirements and selecting security measures.
… textual security requirements patterns and individual defined security requirement patterns, …

Structured pattern-based security requirements elicitation for clouds

K Beckers, M Heisel, I Côté, L Goeke… - … Reliability and Security, 2013 - ieeexplore.ieee.org
… based method supporting eliciting security requirements. The … -out our textual security
requirements patterns. The presented … the instance to the security requirements patterns. In …

[PDF][PDF] Persona security: A technique for supporting the elicitation of security requirements

M Santos, J Rabelo, R Barreto… - Proceedings of the …, 2014 - academia.edu
… to: (a) perform a systematic review on security requirements elicitation in SCESs, to make …
field of security requirements elicitation, and evolve the list of generic security requirements, …

Getting grip on security requirements elicitation by structuring and reusing security requirements sources

C Schmitt, P Liggesmeyer - Complex Systems Informatics and …, 2015 - csimq-journals.rtu.lv
… , incorporate all relevant requirements sources, … security requirements sources on a
project-wise basis. We start with an overview and categorization of important security requirements

A threat analysis methodology for security requirements elicitation in machine learning based systems

C Wilhjelm, AA Younis - … Quality, Reliability and Security …, 2020 - ieeexplore.ieee.org
… Threats and attack libraries help identify security requirements (a threat that is impossible to
… - requirements) [18]. To provide an understanding of the security requirements elicitation for …

[PDF][PDF] Contextualizing security goals: A method for multilateral security requirements elicitation

SF Gürses, T Santen - 2006 - dl.gi.de
… The security requirements elicitation method in this paper is based on … security and security
requirements engineering. The method CREE, for Confidentiality Requirements Elicitation