ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Pattern-based security requirements specification using ontologies and boilerplates
2012 Second IEEE International Workshop on Requirements Patterns (RePa)
◽
10.1109/repa.2012.6359973
◽
2012
◽
Cited By ~ 13
Author(s):
Olawande Daramola
◽
Guttorm Sindre
◽
Tor Stalhane
Keyword(s):
Requirements Specification
◽
Security Requirements
Download Full-text
Related Documents
Cited By
References
Security Requirements Specification in Service-Oriented Business Process Management
2009 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2009.90
◽
2009
◽
Cited By ~ 59
Author(s):
Michael Menzel
◽
Ivonne Thomas
◽
Christoph Meinel
Keyword(s):
Business Process
◽
Business Process Management
◽
Process Management
◽
Requirements Specification
◽
Security Requirements
◽
Service Oriented
Download Full-text
Security Requirements Specification in Process-aware Information Systems
ISSE 2009 Securing Electronic Business Processes
◽
10.1007/978-3-8348-9363-5_14
◽
2010
◽
pp. 145-154
Author(s):
Michael Menzel
◽
Ivonne Thomas
◽
Benjamin Schüler
◽
Maxim Schnjakin
◽
Christoph Meinel
Keyword(s):
Information Systems
◽
Requirements Specification
◽
Security Requirements
Download Full-text
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
2018 IEEE Conference on Dependable and Secure Computing (DSC)
◽
10.1109/desec.2018.8625114
◽
2018
◽
Cited By ~ 3
Author(s):
Kai Qian
◽
Reza M. Parizi
◽
Dan Lo
Keyword(s):
Risk Analysis
◽
Software Development
◽
Requirements Specification
◽
Security Requirements
◽
Mobile Software
Download Full-text
UML-SR: A Novel Security Requirements Specification Language
2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)
◽
10.1109/qrs.2019.00051
◽
2019
◽
Author(s):
Muhammad Mohsin
◽
Muhammad Umair Khan
Keyword(s):
Specification Language
◽
Requirements Specification
◽
Security Requirements
Download Full-text
Security Requirements Specification Framework for Cloud Users
Lecture Notes in Electrical Engineering - Future Information Technology
◽
10.1007/978-3-642-40861-8_43
◽
2014
◽
pp. 297-305
◽
Cited By ~ 6
Author(s):
Rida Naveed
◽
Haider Abbas
Keyword(s):
Requirements Specification
◽
Security Requirements
◽
Cloud Users
Download Full-text
An Enterprise Level Security Requirements Specification Model
Proceedings of the 38th Annual Hawaii International Conference on System Sciences
◽
10.1109/hicss.2005.88
◽
2005
◽
Cited By ~ 3
Author(s):
E. Anderson
◽
J. Choobineh
◽
M.R. Grimaila
Keyword(s):
Requirements Specification
◽
Security Requirements
◽
Enterprise Level
Download Full-text
A Formal Methods Approach to Security Requirements Specification and Verification
2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS)
◽
10.1109/iceccs.2019.00033
◽
2019
◽
Author(s):
Quentin Rouland
◽
Brahim Hamid
◽
Jean-Paul Bodeveix
◽
Mamoun Filali
Keyword(s):
Formal Methods
◽
Requirements Specification
◽
Security Requirements
◽
Specification And Verification
Download Full-text
Security Requirements Specification: A Formal Method Perspective
2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)
◽
10.23919/indiacom49435.2020.9083691
◽
2020
◽
Author(s):
Aditya Dev Mishra
◽
K. Mustafa
Keyword(s):
Formal Method
◽
Requirements Specification
◽
Security Requirements
Download Full-text
Verifying security requirements using model checking technique for UML-based requirements specification
2014 IEEE 1st International Workshop on Requirements Engineering and Testing (RET)
◽
10.1109/ret.2014.6908674
◽
2014
◽
Cited By ~ 3
Author(s):
Yoshitaka Aoki
◽
Saeko Matsuura
Keyword(s):
Model Checking
◽
Requirements Specification
◽
Security Requirements
Download Full-text
A review on security requirements specification by formal methods
Concurrency and Computation Practice and Experience
◽
10.1002/cpe.6702
◽
2021
◽
Author(s):
Aditya Dev Mishra
◽
Khurram Mustafa
Keyword(s):
Formal Methods
◽
Requirements Specification
◽
Security Requirements
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close