Survey and analysis on security requirements engineering
… From our survey, we find that security requirements should be considered as functional
requirements [7], [21] … It is essential to study various SRE methods to analyze and build security …
requirements [7], [21] … It is essential to study various SRE methods to analyze and build security …
[PDF][PDF] Security requirements–A field study of current practice
J Wilander, J Gustavsson - Symposium on Requirement …, 2005 - johnwilander.se
… In a field study of eleven software projects including e-business, health care and military …
practice in security requirements. The overall conclusion is that security requirements are poorly …
practice in security requirements. The overall conclusion is that security requirements are poorly …
Security requirements engineering in the wild: A survey of common practices
… through a survey of security requirements engineering … the survey. The results show
businesses often try to consider … study to answer some of the raised questions about security …
businesses often try to consider … study to answer some of the raised questions about security …
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
… , however, provides an integrationist end-to-end mapping of cloud security requirements, …
, this study contributes towards identifying a unified taxonomy for security requirements, …
, this study contributes towards identifying a unified taxonomy for security requirements, …
A survey on security requirements for WSNs: focusing on the characteristics related to security
… in this study, we derive essential security requirements that … studies based on security have
also been conducted for factors including vulnerabilities, constraints, security requirements, …
also been conducted for factors including vulnerabilities, constraints, security requirements, …
[HTML][HTML] Security requirements of internet of things-based healthcare system: a survey study
… This study was a literature survey on IoT security requirements in healthcare system. We
searched four major digital databases consisting of Web of Science, Scopus, PubMed and IEEE…
searched four major digital databases consisting of Web of Science, Scopus, PubMed and IEEE…
A survey on internet of things security: Requirements, challenges, and solutions
… This paper provides a comprehensive study on IoT security issues, limitations, requirements,
and current and potential solutions. The paper builds upon a taxonomy that taps into the …
and current and potential solutions. The paper builds upon a taxonomy that taps into the …
Reusable knowledge in security requirements engineering: a systematic mapping study
… of the art in security requirements literature. More specifically, this mapping study must find
… that of Chernak [109] who conducted an online survey on requirements reuse in 2010. His …
… that of Chernak [109] who conducted an online survey on requirements reuse in 2010. His …
Towards a systematic survey of industrial IoT security requirements: Research method and quantitative analysis
K Tange, M De Donno, X Fafoutis… - Proceedings of the …, 2019 - dl.acm.org
… security requirements. • Comparison: we compare the security requirements identified by
different studies by taking into account such factors as the number of studies that mention them, …
different studies by taking into account such factors as the number of studies that mention them, …
How to select a security requirements method? a comparative study with students and practitioners
F Massacci, F Paci - Nordic Conference on Secure IT Systems, 2012 - Springer
… The most comprehensive such survey as of today is the Building Security In Maturity … study
we describe in this paper does not aim to evaluate a single security method or to survey the …
we describe in this paper does not aim to evaluate a single security method or to survey the …
相关搜索
- security requirements engineering
- software systems security requirements
- iot security requirements systematic survey
- survey and analysis security requirements
- field study security requirements
- security requirements method comparative study
- framework for security requirements
- cloud security requirements
- security requirements sources
- security requirements elicitation
- integration of common criteria security requirements
- maritime domain security requirements
- evaluation approach security requirements engineering methodology
- survey study healthcare system
- information systems security requirements engineering process
- systematic review security requirements