Managing Conflicts in Goal-Driven Requirements Engineering
IEEE Transactions on Software Engineering
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Requirements Engineering: When Anti-Requirements Hit the Fan
RE '02 Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering
Requirements interaction management
ACM Computing Surveys (CSUR)
Secure Software Development by Example
IEEE Security and Privacy
Demystifying the Threat-Modeling Process
IEEE Security and Privacy
Bridging the Gap between Software Development and Information Security
IEEE Security and Privacy
Extending XP practices to support security requirements engineering
Proceedings of the 2006 international workshop on Software engineering for secure systems
Web Application Security Engineering
IEEE Security and Privacy
Computer Standards & Interfaces
Security Requirements for the Rest of Us: A Survey
IEEE Software
Security Requirements Engineering: A Framework for Representation and Analysis
IEEE Transactions on Software Engineering
Techniques and algorithms for access control list optimization
Computers and Electrical Engineering
An on-line electronic check system with mutual authentication
Computers and Electrical Engineering
Enhanced Certificate-Based Encryption from pairings
Computers and Electrical Engineering
Technical Communication: Attribution of attack trees
Computers and Electrical Engineering
Public key encryption without random oracle made truly practical
Computers and Electrical Engineering
Beyond lightning: A survey on security challenges in cloud computing
Computers and Electrical Engineering
Experiences by using AFFINE for building collaborative applications for online communities
OCSC'13 Proceedings of the 5th international conference on Online Communities and Social Computing
International Journal of Internet Technology and Secured Transactions
Hi-index | 0.00 |
Security Requirements Engineering is a new research area in software engineering, with the realization that security must be analyzed early during the requirements phase. Many researchers are working in this area; however, there is a lack in security requirements treatment. The security requirements are one of the non-functional requirements, which act as constraints on functions of the system. Organizations are depending on information systems for communicating and sharing information. Thus, IT security is becoming central in fulfilling business goals, to guard assets and to create trustworthy systems. To develop systems with adequate security features, it is essential to capture the security requirements. In this paper, we present a view on Security Requirements, issues, types, Security Requirements Engineering (SRE) and methods. We analyzed and compared different methods and found that SQUARE and Security Requirements Engineering Process methods cover most of the important activities of SRE. The developers can adopt these SRE methods and easily identify the security requirements for software systems.