SecRS template to aid novice developers in security requirements identification and documentation

NQ Tunio, R Ahmad - International Journal of Software …, 2022 - journal.ump.edu.my
The security requirements are one of the non-functional requirements (NFR) which acts as a
constraint on the functions of the system to be built. Security requirements are important and …

Software development initiatives to identify and mitigate security threats-two systematic mapping studies

P Silva, R Noël, S Matalonga, H Astudillo, D Gatica… - CLEI Electronic …, 2016 - clei.org
Software Security and development experts have addressed the problem of building secure
software systems. There are several processes and initiatives to achieve secure software …

Mitigating security threats using tactics and patterns: a controlled experiment

G Pedraza-García, R Noël, S Matalonga… - Proccedings of the 10th …, 2016 - dl.acm.org
Security Patterns and Architectural Tactics are two well-known techniques for designing
secure software systems. There is little or no empirical evidence on their relative …

Selection of software components from business objectives scenarios through architectural tactics

G Márquez, H Astudillo - 2017 IEEE/ACM 39th International …, 2017 - ieeexplore.ieee.org
The architecture of a software system is result of architectural design decisions, where
architects select among alternatives (architectural tactics) and software components when a …

[PDF][PDF] Este documento ha sido preparado para el Ministerio de Ciencia, Tecnología, Conocimiento e Innovación (CTCI) en el marco de los compromisos adquiridos …

C del Informe, FH Leiva, BR Sánchez… - 2024 - derechocienciaytecnologia.uc.cl
El “Modelo de Madurez de Capacidades de Ciberseguridad para Naciones”(CMM, por sus
siglas en inglés:“Cybersecurity Capability Maturity Model for Nations”) es un marco …

Técnicas e ferramentas para detecção de vulnerabilidades em ambientes de desenvolvimento ágil de software

LCMC Santos, EPV Prado… - Brazilian Journal of …, 2020 - ojs.brazilianjournals.com.br
Os sistemas de informação precisam ser seguros para atingir seus objetivos. Portanto,
durante o desenvolvimento, é necessário detectar possíveis vulnerabilidades presentes no …

[PDF][PDF] SECURITY REQUIREMENTS SPECIFICATION (SecRS) TEMPLATE TO AID NOVICE DEVELOPERS IN SECURITY REQUIREMENTS IDENTIFICATION AND …

NQ TUNIO - researchgate.net
The security requirements are one of the non-functional requirements (NFR) which acts as
constraint on the functions of the system to be built. Security requirements are important and …

Generating software security knowledge through empirical methods

R Noël, S Matalonga, G Pedraza… - … for Software Security, 2017 - taylorfrancis.com
This chapter exemplifies the use of experimental techniques, borrowed from software
engineering, to create validated knowledge in the Security field. Systematic approaches for …

[引用][C] Methodologies to Identify and Mitigate Security Threats in Software Development

P Silva, R Noel, M Gallego, S Matalonga, H Astudillo - Proceedings of the 19th …, 2016