Security and privacy requirements for the internet of things: A survey
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …
complicated than that for desktop, mobile, or web applications. First, IoT applications require …
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)
Context: Security, in digitally connected organizational environments of today, involves
many different perspectives, including social, physical, and technical factors. In order to …
many different perspectives, including social, physical, and technical factors. In order to …
Towards achieving data security with the cloud computing adoption framework
V Chang, M Ramachandran - IEEE Transactions on services …, 2015 - ieeexplore.ieee.org
Offering real-time data security for petabytes of data is important for cloud computing. A
recent survey on cloud security states that the security of users' data has the highest priority …
recent survey on cloud security states that the security of users' data has the highest priority …
Security in the software development lifecycle
H Assal, S Chiasson - Fourteenth symposium on usable privacy and …, 2018 - usenix.org
We interviewed developers currently employed in industry to explore real-life software
security practices during each stage of the development lifecycle. This paper explores steps …
security practices during each stage of the development lifecycle. This paper explores steps …
A comparison of security requirements engineering methods
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …
security requirements elicitation and analysis. This conceptual framework establishes a …
[HTML][HTML] Security in agile software development: A practitioner survey
Context: Software security engineering provides the means to define, implement and verify
security in software products. Software security engineering is performed by following a …
security in software products. Software security engineering is performed by following a …
Irregular lattices for complex shape grammar facade parsing
H Riemenschneider, U Krispel… - … IEEE conference on …, 2012 - ieeexplore.ieee.org
High-quality urban reconstruction requires more than multi-view reconstruction and local
optimization. The structure of facades depends on the general layout, which has to be …
optimization. The structure of facades depends on the general layout, which has to be …
[HTML][HTML] Modeling security and privacy requirements: a use case-driven approach
Context: Modern internet-based services, ranging from food-delivery to home-caring,
leverage the availability of multiple programmable devices to provide handy services …
leverage the availability of multiple programmable devices to provide handy services …
Mining for computing jobs
A Aken, C Litecky, A Ahmad, J Nelson - IEEE software, 2009 - ieeexplore.ieee.org
A Web content mining approach identified 20 job categories and the associated skills needs
prevalent in the computing professions. Using a Web content data mining application, we …
prevalent in the computing professions. Using a Web content data mining application, we …
Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners
During the software development process and throughout the software lifecycle,
organizations must guarantee users' privacy by protecting personal data. There are several …
organizations must guarantee users' privacy by protecting personal data. There are several …