Reusable knowledge in security requirements engineering: a systematic mapping study

A Souag, R Mazo, C Salinesi… - Requirements …, 2016 - Springer
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …

Towards an ontology for privacy requirements via a systematic literature review

M Gharib, P Giorgini, J Mylopoulos - Conceptual Modeling: 36th …, 2017 - Springer
Privacy has been frequently identified as a main concern for systems that deal with personal
information. However, much of existing work on privacy requirements deals with them as a …

Measuring network security using dynamic bayesian network

M Frigault, L Wang, A Singhal, S Jajodia - … of the 4th ACM workshop on …, 2008 - dl.acm.org
Given the increasing dependence of our societies on networked information systems, the
overall security of these systems should be measured and improved. Existing security …

A comparison of security requirements engineering methods

B Fabian, S Gürses, M Heisel, T Santen… - Requirements …, 2010 - Springer
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …

Goal-driven risk assessment in requirements engineering

Y Asnar, P Giorgini, J Mylopoulos - Requirements Engineering, 2011 - Springer
Risk analysis is traditionally considered a critical activity for the whole software system's
lifecycle. Risks are identified by considering technical aspects (eg, failures of the system …

[HTML][HTML] Modeling security and privacy requirements: a use case-driven approach

PX Mai, A Goknil, LK Shar, F Pastore, LC Briand… - Information and …, 2018 - Elsevier
Context: Modern internet-based services, ranging from food-delivery to home-caring,
leverage the availability of multiple programmable devices to provide handy services …

Measuring security durability of software through fuzzy-based decision-making process

R Kumar, M Zarour, M Alenezi, A Agrawal… - International Journal of …, 2019 - Springer
It is critical to develop secure software with long-term performance and capability to
withstand and forestall the growing competition in the software development industry. To …

An extension of business process model and notation for security risk management

O Altuhhov, R Matulevičius, N Ahmed - International Journal of …, 2013 - igi-global.com
Business process modelling is one of the major aspects in the modern information system
development. Recently business process model and notation (BPMN) has become a …

[HTML][HTML] Modelling trust and risk for cloud services

E Cayirci, AS De Oliveira - Journal of Cloud Computing, 2018 - Springer
A joint trust and risk model is introduced for federated cloud services. The model is based on
cloud service providers' performance history. It addresses provider and consumer concerns …

Evaluation of visual notations as a basis for ics security design decisions

S Fluchs, R Drath, A Fay - IEEE Access, 2023 - ieeexplore.ieee.org
For making informed security decisions during the design of industrial control systems (ICS),
engineers need to process large amounts of security-relevant information outside their area …