A comparison of security requirements engineering methods
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …
security requirements elicitation and analysis. This conceptual framework establishes a …
[HTML][HTML] Modeling security and privacy requirements: a use case-driven approach
Context: Modern internet-based services, ranging from food-delivery to home-caring,
leverage the availability of multiple programmable devices to provide handy services …
leverage the availability of multiple programmable devices to provide handy services …
[PDF][PDF] Approaches to develop and implement iso/iec 27001 standard-information security management systems: A systematic literature review
D Ganji, C Kalloniatis, H Mouratidis… - Int. J. Adv …, 2019 - researchgate.net
This systematic literature review intends to determine the extent to which contribution is
available to assist organisations and interested parties to understand better or comply with …
available to assist organisations and interested parties to understand better or comply with …
Agile development with security engineering activities
D Baca, B Carlsson - Proceedings of the 2011 international conference …, 2011 - dl.acm.org
Agile software development has been used by industry to create a more flexible and lean
software development process, ie making it possible to develop software at a faster rate and …
software development process, ie making it possible to develop software at a faster rate and …
ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system
Established standards on security and risk management provide guidelines and advice to
organizations and other stakeholders on how to fulfill their security needs. However …
organizations and other stakeholders on how to fulfill their security needs. However …
Identification and evaluation of security activities in agile projects
T Ayalew, T Kidane, B Carlsson - … 2013, Ilulissat, Greenland, October 18-21 …, 2013 - Springer
We compare four high-profile waterfall security-engineering processes (CLASP, Microsoft
SDL, Cigital Touchpoints and Common Criteria) with the available preconditions within agile …
SDL, Cigital Touchpoints and Common Criteria) with the available preconditions within agile …
Fuzzy logic driven security requirements engineering process
Security requirements are non-functional requirements which are employed to protect the
information from unauthorized users. After the requirements elicitation process, a system …
information from unauthorized users. After the requirements elicitation process, a system …
A problem-based threat analysis in compliance with common criteria
K Beckers, D Hatebur, M Heisel - … International Conference on …, 2013 - ieeexplore.ieee.org
In order to gain their customers' trust, software vendors can certify their products according to
security standards, eg, the Common Criteria (ISO 15408). A Common Criteria certification …
security standards, eg, the Common Criteria (ISO 15408). A Common Criteria certification …
A data set for quantitative motion analysis
R Dutta, R Manmatha, LR Williams… - 1989 IEEE Computer …, 1989 - computer.org
Software product line engineering has proven to be one of the most successful paradigms
for developing a diversity of similar software applications and software-intensive systems at …
for developing a diversity of similar software applications and software-intensive systems at …
Developing secure software: In an agile process
D Baca - 2012 - diva-portal.org
Background: Software developers are facing increased pressure to lower development time,
release new software versions more frequent to customers and to adapt to a faster market …
release new software versions more frequent to customers and to adapt to a faster market …