Exploring software security approaches in software development lifecycle: A systematic mapping study

NM Mohammed, M Niazi, M Alshayeb… - Computer Standards & …, 2017 - Elsevier
There is an increase use of security driven approaches to support software development
activities, such as requirements, design and implementation. The objective of this paper is to …

A systematic review and analytical evaluation of security requirements engineering approaches

MN Anwar Mohammad, M Nazir, K Mustafa - Arabian Journal for Science …, 2019 - Springer
Security is an inevitable concern in today's scenario of software-based application's
pervasiveness and development practices. Researchers and practitioners frequently …

Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model

U Ullah, RB Faiz, M Haleem - Plos one, 2022 - journals.plos.org
The modeling of security threats is equally important as the modeling of functional
requirements at the design stage of software engineering. However, unlike functional …

Discovery strategy and method for remanufacturing service demand using situational semantic network

L Wang, W Zhou, Z Zhang, XH Xia, J Cao - Ieee Access, 2019 - ieeexplore.ieee.org
Due to customer individual difference, limitation of cognitive process and insufficient real-
time response of cloud-based remanufacturing service platform, the problems such as …

A Unified Framework for GDPR Compliance in Cloud Computing

A Pattakou, V Diamantopoulou, C Kalloniatis… - Proceedings of the 19th …, 2024 - dl.acm.org
In parallel with the rapid development of Information and Communication technologies and
the digitization of information in every aspect of daily life, the enforcement of the GDPR, in …

Design process for usable security and authentication using a user-centered approach

P Realpe-Muñoz, CA Collazos, T Granollers… - Proceedings of the XVIII …, 2017 - dl.acm.org
Computer security is one of the most important current tasks in digital applications. However,
from the best of our knowledge, there is little research for designing effective interfaces in the …

Vulnerabilidad de Ambientes Virtuales de Aprendizaje utilizando SQLMap, RIPS, W3AF y Nessus [Vulnerability in Virtual Learning Environments using SQLMap …

AB López, ACA Aldana… - Ventana …, 2014 - revistasum.umanizales.edu.co
Actualmente y cada segundo se realizan ataques masivos a servicios web, los cuales
ponen en riesgo la información personal y acceso de aquellos que lo utilizan, atentando …

An Automated Security Concerns Recommender Based on Use Case Specification Ontology

I Williams, X Yuan, M Anwar, JT McDonald - Automated Software …, 2022 - Springer
Identifying security concerns is a security activity that can be integrated into the requirements
development phase. However, it has been shown that manually identifying concerns is a …

An Authentication‐Oriented Approach to Model the Crosscutting Constraints in Sequence Diagram Using Aspect OCL

U Ullah, U Musharaf, M Haleem - Security and Communication …, 2022 - Wiley Online Library
The modeling of software functional requirements is very important in the development of
software systems. In addition, it is also highly important to model security requirements …

[PDF][PDF] A goal based framework by adopting square process for privacy and security requirement engineering

B Hayat, R Shakoor, S Mubarak… - International Journal of …, 2017 - researchgate.net
Identifying, categorizing and prioritizing requirements in terms of privacy and security is the
main concern for software developers. Privacy requirement gathering is remain the …