Systematic mapping study on security approaches in secure software engineering

RA Khan, SU Khan, HU Khan, M Ilyas - Ieee Access, 2021 - ieeexplore.ieee.org
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …

Threat analysis of software systems: A systematic literature review

K Tuma, G Calikli, R Scandariato - Journal of Systems and Software, 2018 - Elsevier
Architectural threat analysis has become an important cornerstone for organizations
concerned with developing secure software. Due to the large number of existing techniques …

On lightweight mobile phone application certification

W Enck, M Ongtang, P McDaniel - … of the 16th ACM conference on …, 2009 - dl.acm.org
Users have begun downloading an increasingly large number of mobile phone applications
in response to advancements in handsets and wireless networks. The increased number of …

[HTML][HTML] STORE: Security threat oriented requirements engineering methodology

MTJ Ansari, D Pandey, M Alenezi - … of King Saud University-Computer and …, 2022 - Elsevier
As we are continuously depending on information technology applications by adopting
electronic channels and software applications for our business, online transaction and …

A systematic review of security requirements engineering

D Mellado, C Blanco, LE Sánchez… - Computer Standards & …, 2010 - Elsevier
One of the most important aspects in the achievement of secure software systems in the
software development process is what is known as Security Requirements Engineering …

[HTML][HTML] System security assurance: A systematic literature review

A Shukla, B Katt, LO Nweke, PK Yeng… - Computer Science …, 2022 - Elsevier
Abstract System security assurance provides the confidence that security features, practices,
procedures, and architecture of software systems mediate and enforce the security policy …

Stram: Measuring the trustworthiness of computer-based systems

JH Cho, S Xu, PM Hurley, M Mackay… - ACM Computing …, 2019 - dl.acm.org
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …

Route skyline queries: A multi-preference path planning approach

HP Kriegel, M Renz, M Schubert - 2010 IEEE 26th International …, 2010 - ieeexplore.ieee.org
In recent years, the research community introduced various methods for processing skyline
queries in multidimensional databases. The skyline operator retrieves all objects being …

A framework to support selection of cloud providers based on security and privacy requirements

H Mouratidis, S Islam, C Kalloniatis… - Journal of Systems and …, 2013 - Elsevier
Cloud computing is an evolving paradigm that is radically changing the way humans store,
share and access their digital files. Despite the many benefits, such as the introduction of a …

Requirements engineering tools: Capabilities, survey and assessment

JMC De Gea, J Nicolás, JLF Alemán, A Toval… - Information and …, 2012 - Elsevier
CONTEXT: There is a significant number of requirements engineering (RE) tools with
different features and prices. However, existing RE tool lists do not provide detailed …