Social Modeling and i*

ES Yu - … modeling: Foundations and applications: Essays in …, 2009 - Springer
Many different types of models are used in various scientific and engineering fields,
reflecting the subject matter and the kinds of understanding that is sought in each field …

Towards cloud computing SLA risk management: issues and challenges

JH Morin, J Aubert, B Gateau - 2012 45th Hawaii International …, 2012 - ieeexplore.ieee.org
Cloud Computing has become mainstream technology offering a commoditized approach to
software, platform and infrastructure as a service over the Internet on a global scale. This …

A comparison of security requirements engineering methods

B Fabian, S Gürses, M Heisel, T Santen… - Requirements …, 2010 - Springer
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …

A systematic approach to define the domain of information system security risk management

É Dubois, P Heymans, N Mayer… - … on information systems …, 2010 - Springer
Today, security concerns are at the heart of information systems, both at technological and
organizational levels. With over 200 practitioner-oriented risk management methods and …

An integrated conceptual model for information system security risk management supported by enterprise architecture management

N Mayer, J Aubert, E Grandry, C Feltus… - Software & Systems …, 2019 - Springer
Risk management is today a major steering tool for any organisation wanting to deal with
information system (IS) security. However, IS security risk management (ISSRM) remains a …

A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities

G Elahi, E Yu, N Zannone - Requirements engineering, 2010 - Springer
Many security breaches occur because of exploitation of vulnerabilities within the system.
Vulnerabilities are weaknesses in the requirements, design, and implementation, which …

An extension of business process model and notation for security risk management

O Altuhhov, R Matulevičius, N Ahmed - International Journal of …, 2013 - igi-global.com
Business process modelling is one of the major aspects in the modern information system
development. Recently business process model and notation (BPMN) has become a …

Self-adaptive and secure mechanism for IoT based multimedia services: a survey

I Singh, SW Lee - Multimedia Tools and Applications, 2022 - Springer
With the advent of internet of things (IoT) and IoT multimedia services in real-time
applications, including smart healthcare, smart home, and smart connected transportation …

Towards an ontology for privacy requirements via a systematic literature review

M Gharib, P Giorgini, J Mylopoulos - Conceptual Modeling: 36th …, 2017 - Springer
Privacy has been frequently identified as a main concern for systems that deal with personal
information. However, much of existing work on privacy requirements deals with them as a …

Risk-oriented design approach for forensic-ready software systems

L Daubner, R Matulevičius - … of the 16th International Conference on …, 2021 - dl.acm.org
Digital forensic investigation is a complex and time-consuming activity in response to a
cybersecurity incident or cybercrime to answer questions related to it. These typically are …