Systematic literature review of security pattern research
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …
and operations that often appear in certain contexts. Since the late 1990s, about 500 …
[图书][B] Bridging the gap between requirements engineering and software architecture
A Alebrahim, M Heisel - 2017 - Springer
Two essential activities in the software development process are requirements engineering
(RE) and software architecting. The focus of RE is on eliciting, analyzing, and managing …
(RE) and software architecting. The focus of RE is on eliciting, analyzing, and managing …
Towards a security‐optimized approach for the microservice‐oriented decomposition
Microservice architecture (MSA) is a mainstream architectural style due to its high
maintainability and scalability. In practice, an appropriate microservice‐oriented …
maintainability and scalability. In practice, an appropriate microservice‐oriented …
[图书][B] Problem-based privacy analysis (ProPAn): a computer-aided privacy requirements engineering method
R Meis - 2018 - search.proquest.com
With the advancing digitalization in almost all parts of our daily life, eg, electronic health
records and smart homes, and the outsourcing of data processing, eg, data storage in the …
records and smart homes, and the outsourcing of data processing, eg, data storage in the …
Problem-oriented security patterns for requirements engineering
A Alebrahim, M Heisel - Proceedings of the 19th European Conference …, 2014 - dl.acm.org
Security is one essential quality requirement that needs to be addressed during the software
development process. While quality requirements such as security are supposed to be the …
development process. While quality requirements such as security are supposed to be the …
An analysis pattern driven requirements modeling method
J Ji, R Peng - 2016 IEEE 24th International Requirements …, 2016 - ieeexplore.ieee.org
Enormous commercial value brought by big data analysis promotes the vigorous
development of big data analysis industry. Due to the difficulties existed in the modeling …
development of big data analysis industry. Due to the difficulties existed in the modeling …
Towards developing secure software using problem-oriented security patterns
A Alebrahim, M Heisel - Availability, Reliability, and Security in Information …, 2014 - Springer
Security as one essential quality requirement has to be addressed during the software
development process. Quality requirements such as security drive the architecture of a …
development process. Quality requirements such as security drive the architecture of a …
Aspect Frames: Describing Cross-Cutting Concerns in Aspect-Oriented Requirements Engineering
R Meis, M Heisel - Proceedings of the 22nd European Conference on …, 2017 - dl.acm.org
Cross-cutting concerns often arise when non-functional requirements are operationalized,
because non-functional requirements are themselves cross-cutting. In the field of aspect …
because non-functional requirements are themselves cross-cutting. In the field of aspect …
[PDF][PDF] Performance Analysis Patterns for Requirements Analysis.
A Alebrahim - SOFSEM (Student Research Forum Papers/Posters), 2015 - Citeseer
Many problems might arise when performance requirements are not taken into account from
the beginning of software development. Architectural solutions such as performance …
the beginning of software development. Architectural solutions such as performance …
[PDF][PDF] Managing Security Risks During Requirements Engineering
R Wirtz - 2021 - d-nb.info
Due to the ongoing digitalization of our everyday life, the consideration of security for
software-intensive systems is of great importance. The number of reported security incidents …
software-intensive systems is of great importance. The number of reported security incidents …