A systematic review of security requirements engineering

D Mellado, C Blanco, LE Sánchez… - Computer Standards & …, 2010 - Elsevier
One of the most important aspects in the achievement of secure software systems in the
software development process is what is known as Security Requirements Engineering …

The least secure places in the universe? A systematic literature review on information security management in higher education

I Bongiovanni - Computers & Security, 2019 - Elsevier
Current research has demonstrated the progressively more strategic role that information
security has in modern organisations. Higher education is no exception. The reported …

A quantitative analysis of current security concerns and solutions for cloud computing

N Gonzalez, C Miers, F Redigolo, M Simplicio… - Journal of Cloud …, 2012 - Springer
Abstract The development of cloud computing services is speeding up the rate in which the
organizations outsource their computational services or sell their idle computational …

[HTML][HTML] STORE: Security threat oriented requirements engineering methodology

MTJ Ansari, D Pandey, M Alenezi - … of King Saud University-Computer and …, 2022 - Elsevier
As we are continuously depending on information technology applications by adopting
electronic channels and software applications for our business, online transaction and …

A common criteria based security requirements engineering process for the development of secure information systems

D Mellado, E Fernández-Medina, M Piattini - Computer standards & …, 2007 - Elsevier
In order to develop security critical Information Systems, specifying security quality
requirements is vitally important, although it is a very difficult task. Fortunately, there are …

A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach

V Casola, A De Benedictis, M Rak, U Villano - Journal of Systems and …, 2020 - Elsevier
Recent software development methodologies, as DevOps or Agile, are very popular and
widely used, especially for the development of cloud services and applications. They …

Addressing legal requirements in requirements engineering

PN Otto, AI Antón - 15th IEEE international requirements …, 2007 - ieeexplore.ieee.org
Legal texts, such as regulations and legislation, are playing an increasingly important role in
requirements engineering and system development. Monitoring systems for requirements …

Modeling security requirements through ownership, permission and delegation

P Giorgini, F Massacci, J Mylopoulos… - … Engineering (RE'05), 2005 - ieeexplore.ieee.org
Security requirements engineering is emerging as a branch of software engineering,
spurred by the realization that security must be dealt with early on during the requirements …

Information security investments: An exploratory multiple case study on decision-making, evaluation and learning

E Weishäupl, E Yasasin, G Schryen - Computers & Security, 2018 - Elsevier
The need to protect resources against attackers is reflected by huge information security
investments of firms worldwide. In the presence of budget constraints and a diverse set of …

A review on mobile SMS spam filtering techniques

MA Shafi'I, MS Abd Latiff, H Chiroma, O Osho… - IEEE …, 2017 - ieeexplore.ieee.org
Under short messaging service (SMS) spam is understood the unsolicited or undesired
messages received on mobile phones. These SMS spams constitute a veritable nuisance to …