A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development

MTJ Ansari, FA Al-Zahrani, D Pandey… - BMC Medical Informatics …, 2020 - Springer
Background Today's healthcare organizations want to implement secure and quality
healthcare software as cyber-security is a significant risk factor for healthcare data …

[HTML][HTML] STORE: Security threat oriented requirements engineering methodology

MTJ Ansari, D Pandey, M Alenezi - … of King Saud University-Computer and …, 2022 - Elsevier
As we are continuously depending on information technology applications by adopting
electronic channels and software applications for our business, online transaction and …

[PDF][PDF] A review on factors influencing implementation of secure software development practices

SL Kanniah, MN Mahrin - International Journal of Computer and …, 2016 - academia.edu
More and more businesses and services are depending on software to run their daily
operations and business services. At the same time, cyber-attacNs are becoming more …

[HTML][HTML] Balancing software and training requirements for information security

D Fujs, S Vrhovec, D Vavpotič - Computers & security, 2023 - Elsevier
Abstract Information security is one of the key areas of consideration to assure reliable and
dependable information systems (IS). Achieving an appropriate level of IS security requires …

[PDF][PDF] Security and privacy requirements engineering methods for traditional and cloud-based systems: a review

A Pattakou, C Kalloniatis, S Gritzalis - Cloud Comput, 2017 - academia.edu
As the software industry experiences a rapid growth in developing information systems,
many methodologies, technologies and tools are continuously developing in order to …

Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach

M Salnitri, K Angelopoulos, M Pavlidis… - Software and Systems …, 2020 - Springer
Personal data have become a central asset for multiple enterprise applications and online
services offered by private companies, public organisations or a combination of both. The …

Ontology-based representation of reusable security requirements for developing secure web applications

P Salini, S Kanmani - International Journal of Internet …, 2013 - inderscienceonline.com
Security is the major issue in web applications and it should be carefully considered in all
the phases of the software development life cycle. The security requirements should be …

[HTML][HTML] A classification approach for software requirements towards maintainable security

P Kadebu, S Sikka, RK Tyagi, P Chiurunge - Scientific African, 2023 - Elsevier
As trends continue to move toward the introduction of intelligent methods to automate
software engineering processes, security requirements classification is rapidly turning into a …

[PDF][PDF] A knowledge-oriented approach to security requirements engineering for e-voting system

P Salini, S Kanmani - International Journal of Computer …, 2012 - researchgate.net
In this paper, we introduce a knowledge-oriented approach for the Security Requirements
Engineering phase for developing E-Voting System. The knowledge acquired through the …

Elicitation of security requirements for e-health system by applying Model Oriented Security Requirements Engineering (MOSRE) framework

P Salini, S Kanmani - … of the Second International Conference on …, 2012 - dl.acm.org
E-health is a health care system which is supported by electronic process and
communication. The information that is kept in the system must be accurate. In case of false …