Social Modeling and i*
ES Yu - … modeling: Foundations and applications: Essays in …, 2009 - Springer
Many different types of models are used in various scientific and engineering fields,
reflecting the subject matter and the kinds of understanding that is sought in each field …
reflecting the subject matter and the kinds of understanding that is sought in each field …
Towards cloud computing SLA risk management: issues and challenges
Cloud Computing has become mainstream technology offering a commoditized approach to
software, platform and infrastructure as a service over the Internet on a global scale. This …
software, platform and infrastructure as a service over the Internet on a global scale. This …
A comparison of security requirements engineering methods
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …
security requirements elicitation and analysis. This conceptual framework establishes a …
A systematic approach to define the domain of information system security risk management
Today, security concerns are at the heart of information systems, both at technological and
organizational levels. With over 200 practitioner-oriented risk management methods and …
organizational levels. With over 200 practitioner-oriented risk management methods and …
An integrated conceptual model for information system security risk management supported by enterprise architecture management
Risk management is today a major steering tool for any organisation wanting to deal with
information system (IS) security. However, IS security risk management (ISSRM) remains a …
information system (IS) security. However, IS security risk management (ISSRM) remains a …
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
Many security breaches occur because of exploitation of vulnerabilities within the system.
Vulnerabilities are weaknesses in the requirements, design, and implementation, which …
Vulnerabilities are weaknesses in the requirements, design, and implementation, which …
An extension of business process model and notation for security risk management
O Altuhhov, R Matulevičius, N Ahmed - International Journal of …, 2013 - igi-global.com
Business process modelling is one of the major aspects in the modern information system
development. Recently business process model and notation (BPMN) has become a …
development. Recently business process model and notation (BPMN) has become a …
Self-adaptive and secure mechanism for IoT based multimedia services: a survey
With the advent of internet of things (IoT) and IoT multimedia services in real-time
applications, including smart healthcare, smart home, and smart connected transportation …
applications, including smart healthcare, smart home, and smart connected transportation …
Towards an ontology for privacy requirements via a systematic literature review
Privacy has been frequently identified as a main concern for systems that deal with personal
information. However, much of existing work on privacy requirements deals with them as a …
information. However, much of existing work on privacy requirements deals with them as a …
Risk-oriented design approach for forensic-ready software systems
L Daubner, R Matulevičius - … of the 16th International Conference on …, 2021 - dl.acm.org
Digital forensic investigation is a complex and time-consuming activity in response to a
cybersecurity incident or cybercrime to answer questions related to it. These typically are …
cybersecurity incident or cybercrime to answer questions related to it. These typically are …