A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development
MTJ Ansari, FA Al-Zahrani, D Pandey… - BMC Medical Informatics …, 2020 - Springer
Background Today's healthcare organizations want to implement secure and quality
healthcare software as cyber-security is a significant risk factor for healthcare data …
healthcare software as cyber-security is a significant risk factor for healthcare data …
[HTML][HTML] STORE: Security threat oriented requirements engineering methodology
As we are continuously depending on information technology applications by adopting
electronic channels and software applications for our business, online transaction and …
electronic channels and software applications for our business, online transaction and …
[PDF][PDF] A review on factors influencing implementation of secure software development practices
SL Kanniah, MN Mahrin - International Journal of Computer and …, 2016 - academia.edu
More and more businesses and services are depending on software to run their daily
operations and business services. At the same time, cyber-attacNs are becoming more …
operations and business services. At the same time, cyber-attacNs are becoming more …
[HTML][HTML] Balancing software and training requirements for information security
Abstract Information security is one of the key areas of consideration to assure reliable and
dependable information systems (IS). Achieving an appropriate level of IS security requires …
dependable information systems (IS). Achieving an appropriate level of IS security requires …
[PDF][PDF] Security and privacy requirements engineering methods for traditional and cloud-based systems: a review
A Pattakou, C Kalloniatis, S Gritzalis - Cloud Comput, 2017 - academia.edu
As the software industry experiences a rapid growth in developing information systems,
many methodologies, technologies and tools are continuously developing in order to …
many methodologies, technologies and tools are continuously developing in order to …
Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach
Personal data have become a central asset for multiple enterprise applications and online
services offered by private companies, public organisations or a combination of both. The …
services offered by private companies, public organisations or a combination of both. The …
Ontology-based representation of reusable security requirements for developing secure web applications
Security is the major issue in web applications and it should be carefully considered in all
the phases of the software development life cycle. The security requirements should be …
the phases of the software development life cycle. The security requirements should be …
[HTML][HTML] A classification approach for software requirements towards maintainable security
As trends continue to move toward the introduction of intelligent methods to automate
software engineering processes, security requirements classification is rapidly turning into a …
software engineering processes, security requirements classification is rapidly turning into a …
[PDF][PDF] A knowledge-oriented approach to security requirements engineering for e-voting system
In this paper, we introduce a knowledge-oriented approach for the Security Requirements
Engineering phase for developing E-Voting System. The knowledge acquired through the …
Engineering phase for developing E-Voting System. The knowledge acquired through the …
Elicitation of security requirements for e-health system by applying Model Oriented Security Requirements Engineering (MOSRE) framework
E-health is a health care system which is supported by electronic process and
communication. The information that is kept in the system must be accurate. In case of false …
communication. The information that is kept in the system must be accurate. In case of false …