A comparison of security requirements engineering methods

B Fabian, S Gürses, M Heisel, T Santen… - Requirements …, 2010 - Springer
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …

[HTML][HTML] Modeling security and privacy requirements: a use case-driven approach

PX Mai, A Goknil, LK Shar, F Pastore, LC Briand… - Information and …, 2018 - Elsevier
Context: Modern internet-based services, ranging from food-delivery to home-caring,
leverage the availability of multiple programmable devices to provide handy services …

[PDF][PDF] Approaches to develop and implement iso/iec 27001 standard-information security management systems: A systematic literature review

D Ganji, C Kalloniatis, H Mouratidis… - Int. J. Adv …, 2019 - researchgate.net
This systematic literature review intends to determine the extent to which contribution is
available to assist organisations and interested parties to understand better or comply with …

Agile development with security engineering activities

D Baca, B Carlsson - Proceedings of the 2011 international conference …, 2011 - dl.acm.org
Agile software development has been used by industry to create a more flexible and lean
software development process, ie making it possible to develop software at a faster rate and …

ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system

K Beckers, M Heisel, B Solhaug, K Stølen - Engineering Secure Future …, 2014 - Springer
Established standards on security and risk management provide guidelines and advice to
organizations and other stakeholders on how to fulfill their security needs. However …

Identification and evaluation of security activities in agile projects

T Ayalew, T Kidane, B Carlsson - … 2013, Ilulissat, Greenland, October 18-21 …, 2013 - Springer
We compare four high-profile waterfall security-engineering processes (CLASP, Microsoft
SDL, Cigital Touchpoints and Common Criteria) with the available preconditions within agile …

Fuzzy logic driven security requirements engineering process

M Sadiq, V Susheela Devi, J Ahmad… - Journal of Information …, 2021 - Taylor & Francis
Security requirements are non-functional requirements which are employed to protect the
information from unauthorized users. After the requirements elicitation process, a system …

A problem-based threat analysis in compliance with common criteria

K Beckers, D Hatebur, M Heisel - … International Conference on …, 2013 - ieeexplore.ieee.org
In order to gain their customers' trust, software vendors can certify their products according to
security standards, eg, the Common Criteria (ISO 15408). A Common Criteria certification …

A data set for quantitative motion analysis

R Dutta, R Manmatha, LR Williams… - 1989 IEEE Computer …, 1989 - computer.org
Software product line engineering has proven to be one of the most successful paradigms
for developing a diversity of similar software applications and software-intensive systems at …

Developing secure software: In an agile process

D Baca - 2012 - diva-portal.org
Background: Software developers are facing increased pressure to lower development time,
release new software versions more frequent to customers and to adapt to a faster market …