Systematic mapping study on security approaches in secure software engineering
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …
integral component of human society. Such wide use of software systems consists of large …
Threat analysis of software systems: A systematic literature review
Architectural threat analysis has become an important cornerstone for organizations
concerned with developing secure software. Due to the large number of existing techniques …
concerned with developing secure software. Due to the large number of existing techniques …
On lightweight mobile phone application certification
W Enck, M Ongtang, P McDaniel - … of the 16th ACM conference on …, 2009 - dl.acm.org
Users have begun downloading an increasingly large number of mobile phone applications
in response to advancements in handsets and wireless networks. The increased number of …
in response to advancements in handsets and wireless networks. The increased number of …
[HTML][HTML] STORE: Security threat oriented requirements engineering methodology
As we are continuously depending on information technology applications by adopting
electronic channels and software applications for our business, online transaction and …
electronic channels and software applications for our business, online transaction and …
A systematic review of security requirements engineering
One of the most important aspects in the achievement of secure software systems in the
software development process is what is known as Security Requirements Engineering …
software development process is what is known as Security Requirements Engineering …
[HTML][HTML] System security assurance: A systematic literature review
Abstract System security assurance provides the confidence that security features, practices,
procedures, and architecture of software systems mediate and enforce the security policy …
procedures, and architecture of software systems mediate and enforce the security policy …
Stram: Measuring the trustworthiness of computer-based systems
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …
systems, such as dependability and security metrics for estimating their performance and …
Route skyline queries: A multi-preference path planning approach
In recent years, the research community introduced various methods for processing skyline
queries in multidimensional databases. The skyline operator retrieves all objects being …
queries in multidimensional databases. The skyline operator retrieves all objects being …
A framework to support selection of cloud providers based on security and privacy requirements
Cloud computing is an evolving paradigm that is radically changing the way humans store,
share and access their digital files. Despite the many benefits, such as the introduction of a …
share and access their digital files. Despite the many benefits, such as the introduction of a …
Requirements engineering tools: Capabilities, survey and assessment
CONTEXT: There is a significant number of requirements engineering (RE) tools with
different features and prices. However, existing RE tool lists do not provide detailed …
different features and prices. However, existing RE tool lists do not provide detailed …