A security ontology for security requirements elicitation
… the IS security requirements elicitation and analysis process. The completeness of this
ontology was evaluated with regards to existing security ontologies used in security requirements …
ontology was evaluated with regards to existing security ontologies used in security requirements …
Security Requirements Elicitation Using View Points for Online System
A Agarwal, D Gupta - … on Emerging Trends in Engineering and …, 2008 - ieeexplore.ieee.org
… are and he/she is able to distinguish security requirements from various architectural and …
for security requirements elicitation presenting techniques for activities like requirements …
for security requirements elicitation presenting techniques for activities like requirements …
Requirements elicitation: Issues and challenges
S Sharma, SK Pandey - 2014 international conference on …, 2014 - ieeexplore.ieee.org
… requirements elicitation goals [3]. In this paper, a comprehensive analysis of state-of-the-art
techniques and practice of requirements elicitation … may arise during requirements elicitation. …
techniques and practice of requirements elicitation … may arise during requirements elicitation. …
[PDF][PDF] Problem-based Elicitation of Security Requirements
R Wirtz, M Heisel, R Meis, A Omerovic… - Proceedings of the 13th …, 2018 - scitepress.org
… Eliciting security requirements should be done in a systematic way. We propse a method to
elicit security requirements that … Riskrep: Risk-based security requirements elicitation and …
elicit security requirements that … Riskrep: Risk-based security requirements elicitation and …
相关搜索
- software security requirements elicitation
- security requirements elicitation techniques
- security requirements elicitation secure tropos
- ontology security requirements elicitation
- security requirements elicitation processes
- security requirements elicitation abuse frames
- security requirements elicitation misuse
- common criteria security requirements elicitation
A structured method for security requirements elicitation concerning the cloud computing domain
K Beckers, I Côté, L Goeke, S Güler… - International Journal of …, 2014 - igi-global.com
… -based method supporting eliciting security requirements and selecting security measures.
… textual security requirements patterns and individual defined security requirement patterns, …
… textual security requirements patterns and individual defined security requirement patterns, …
Structured pattern-based security requirements elicitation for clouds
K Beckers, M Heisel, I Côté, L Goeke… - … Reliability and Security, 2013 - ieeexplore.ieee.org
… based method supporting eliciting security requirements. The … -out our textual security
requirements patterns. The presented … the instance to the security requirements patterns. In …
requirements patterns. The presented … the instance to the security requirements patterns. In …
[PDF][PDF] Persona security: A technique for supporting the elicitation of security requirements
… to: (a) perform a systematic review on security requirements elicitation in SCESs, to make …
field of security requirements elicitation, and evolve the list of generic security requirements, …
field of security requirements elicitation, and evolve the list of generic security requirements, …
Getting grip on security requirements elicitation by structuring and reusing security requirements sources
C Schmitt, P Liggesmeyer - Complex Systems Informatics and …, 2015 - csimq-journals.rtu.lv
… , incorporate all relevant requirements sources, … security requirements sources on a
project-wise basis. We start with an overview and categorization of important security requirements …
project-wise basis. We start with an overview and categorization of important security requirements …
A threat analysis methodology for security requirements elicitation in machine learning based systems
C Wilhjelm, AA Younis - … Quality, Reliability and Security …, 2020 - ieeexplore.ieee.org
… Threats and attack libraries help identify security requirements (a threat that is impossible to
… - requirements) [18]. To provide an understanding of the security requirements elicitation for …
… - requirements) [18]. To provide an understanding of the security requirements elicitation for …
[PDF][PDF] Contextualizing security goals: A method for multilateral security requirements elicitation
SF Gürses, T Santen - 2006 - dl.gi.de
… The security requirements elicitation method in this paper is based on … security and security
requirements engineering. The method CREE, for Confidentiality Requirements Elicitation …
requirements engineering. The method CREE, for Confidentiality Requirements Elicitation …