Security and privacy requirements for the internet of things: A survey

N Alhirabi, O Rana, C Perera - ACM Transactions on Internet of Things, 2021 - dl.acm.org
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …

Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)

A Yasin, L Liu, T Li, J Wang, D Zowghi - Information and Software …, 2018 - Elsevier
Context: Security, in digitally connected organizational environments of today, involves
many different perspectives, including social, physical, and technical factors. In order to …

Towards achieving data security with the cloud computing adoption framework

V Chang, M Ramachandran - IEEE Transactions on services …, 2015 - ieeexplore.ieee.org
Offering real-time data security for petabytes of data is important for cloud computing. A
recent survey on cloud security states that the security of users' data has the highest priority …

Security in the software development lifecycle

H Assal, S Chiasson - Fourteenth symposium on usable privacy and …, 2018 - usenix.org
We interviewed developers currently employed in industry to explore real-life software
security practices during each stage of the development lifecycle. This paper explores steps …

A comparison of security requirements engineering methods

B Fabian, S Gürses, M Heisel, T Santen… - Requirements …, 2010 - Springer
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …

[HTML][HTML] Security in agile software development: A practitioner survey

K Rindell, J Ruohonen, J Holvitie, S Hyrynsalmi… - Information and …, 2021 - Elsevier
Context: Software security engineering provides the means to define, implement and verify
security in software products. Software security engineering is performed by following a …

Irregular lattices for complex shape grammar facade parsing

H Riemenschneider, U Krispel… - … IEEE conference on …, 2012 - ieeexplore.ieee.org
High-quality urban reconstruction requires more than multi-view reconstruction and local
optimization. The structure of facades depends on the general layout, which has to be …

[HTML][HTML] Modeling security and privacy requirements: a use case-driven approach

PX Mai, A Goknil, LK Shar, F Pastore, LC Briand… - Information and …, 2018 - Elsevier
Context: Modern internet-based services, ranging from food-delivery to home-caring,
leverage the availability of multiple programmable devices to provide handy services …

Mining for computing jobs

A Aken, C Litecky, A Ahmad, J Nelson - IEEE software, 2009 - ieeexplore.ieee.org
A Web content mining approach identified 20 job categories and the associated skills needs
prevalent in the computing professions. Using a Web content data mining application, we …

Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners

ED Canedo, IN Bandeira, ATS Calazans… - Requirements …, 2023 - Springer
During the software development process and throughout the software lifecycle,
organizations must guarantee users' privacy by protecting personal data. There are several …