AbstractDefining security requirements is of prime importance for all systems; we usually study the generic ones like confidentiality, integrity, availability, authentication, non-repudiation and privacy. It is thus imperative to evaluate all the possible extended requirements. A literature review has shown that there are various and different security requirements models, some of which are examined and others are neglected. Moreover, security lacks a unified taxonomy of security requirements. In this paper, we refer to the variety of security requirements models from the literature to drive an aggregate model and move away from the individualistic proposed taxonomy to a hierarchical and standard security requirement model. We define and pr...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Context: Security considerations are typically incorporated in the later stages of development as an...
There are several approaches to elicit, analyze and specify security requirements ranging from forma...
Needs about security are matters little taken into account when managing requirements engineering , ...
Abstract. Various security requirements sources need to be incorporated when developing security req...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
In this work we introduce the principle of comprehensible security, which demands that the security ...
The primary goal of this research is to develop a structured object-oriented security requirements a...
Abstract — As information security became an increasing concern for software developers and users, r...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
Well-defined and unambiguous security requirements are essential for developing secure software syst...
Requirements specifications for high assurance secure systems are rare in the open literature. This ...
Defining security requirements is the important first step in designing, implementing and evaluating...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Context: Security considerations are typically incorporated in the later stages of development as an...
There are several approaches to elicit, analyze and specify security requirements ranging from forma...
Needs about security are matters little taken into account when managing requirements engineering , ...
Abstract. Various security requirements sources need to be incorporated when developing security req...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
In this work we introduce the principle of comprehensible security, which demands that the security ...
The primary goal of this research is to develop a structured object-oriented security requirements a...
Abstract — As information security became an increasing concern for software developers and users, r...
The elaboration of requirements is a crucial step in the development of software-intensive security-...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
Well-defined and unambiguous security requirements are essential for developing secure software syst...
Requirements specifications for high assurance secure systems are rare in the open literature. This ...
Defining security requirements is the important first step in designing, implementing and evaluating...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Context: Security considerations are typically incorporated in the later stages of development as an...
There are several approaches to elicit, analyze and specify security requirements ranging from forma...