Survey and analysis on security requirements engineering

P Salini, S Kanmani - Computers & Electrical Engineering, 2012 - Elsevier
… From our survey, we find that security requirements should be considered as functional
requirements [7], [21] … It is essential to study various SRE methods to analyze and build security

[PDF][PDF] Security requirements–A field study of current practice

J Wilander, J Gustavsson - Symposium on Requirement …, 2005 - johnwilander.se
… In a field study of eleven software projects including e-business, health care and military …
practice in security requirements. The overall conclusion is that security requirements are poorly …

Security requirements engineering in the wild: A survey of common practices

G Elahi, E Yu, T Li, L Liu - 2011 IEEE 35th Annual Computer …, 2011 - ieeexplore.ieee.org
… through a survey of security requirements engineering … the survey. The results show
businesses often try to consider … study to answer some of the raised questions about security

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
… , however, provides an integrationist end-to-end mapping of cloud security requirements, …
, this study contributes towards identifying a unified taxonomy for security requirements, …

A survey on security requirements for WSNs: focusing on the characteristics related to security

JY Yu, E Lee, SR Oh, YD Seo, YG Kim - IEEE Access, 2020 - ieeexplore.ieee.org
… in this study, we derive essential security requirements that … studies based on security have
also been conducted for factors including vulnerabilities, constraints, security requirements, …

[HTML][HTML] Security requirements of internet of things-based healthcare system: a survey study

S Nasiri, F Sadoughi, MH Tadayon… - Acta Informatica …, 2019 - ncbi.nlm.nih.gov
… This study was a literature survey on IoT security requirements in healthcare system. We
searched four major digital databases consisting of Web of Science, Scopus, PubMed and IEEE…

A survey on internet of things security: Requirements, challenges, and solutions

H HaddadPajouh, A Dehghantanha, RM Parizi… - Internet of Things, 2021 - Elsevier
… This paper provides a comprehensive study on IoT security issues, limitations, requirements,
and current and potential solutions. The paper builds upon a taxonomy that taps into the …

Reusable knowledge in security requirements engineering: a systematic mapping study

A Souag, R Mazo, C Salinesi… - Requirements …, 2016 - Springer
… of the art in security requirements literature. More specifically, this mapping study must find
… that of Chernak [109] who conducted an online survey on requirements reuse in 2010. His …

Towards a systematic survey of industrial IoT security requirements: Research method and quantitative analysis

K Tange, M De Donno, X Fafoutis… - Proceedings of the …, 2019 - dl.acm.org
security requirements. • Comparison: we compare the security requirements identified by
different studies by taking into account such factors as the number of studies that mention them, …

How to select a security requirements method? a comparative study with students and practitioners

F Massacci, F Paci - Nordic Conference on Secure IT Systems, 2012 - Springer
… The most comprehensive such survey as of today is the Building Security In Maturity … study
we describe in this paper does not aim to evaluate a single security method or to survey the …