2019
DOI: 10.3233/jifs-182907
|View full text |Cite
|
Sign up to set email alerts
|

A fuzzy framework for prioritization and partial selection of security requirements in software projects

Abstract: Owing to resource constraints, the existing prioritization and selection techniques for software security requirements (countermeasures) find a subset of higher-priority security requirements ignoring lowerpriority requirements or postponing them to the future releases. Ignoring or postponing security requirements however, may on one hand leave some of the security threats (vulnerabilities) unattended and on the other hand influence other security requirements that rely on the ignored or postponed requirements… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
29
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 16 publications
(29 citation statements)
references
References 65 publications
(48 reference statements)
0
29
0
Order By: Relevance
“…Hence, all information related to software must be secure and the demand for secure software has increased today. Software security can be termed as the idea to secure software from malicious attacks and fraudulent persons or hackers (FCW Workshop, 2016;Mougouei, 2017). Many experts have discussed many areas of security including security attributes, security management, security maintenance, etc., but still, there is something missing.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Hence, all information related to software must be secure and the demand for secure software has increased today. Software security can be termed as the idea to secure software from malicious attacks and fraudulent persons or hackers (FCW Workshop, 2016;Mougouei, 2017). Many experts have discussed many areas of security including security attributes, security management, security maintenance, etc., but still, there is something missing.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Many experts have discussed many areas of security including security attributes, security management, security maintenance, etc., but still, there is something missing. Organizations are investing both money and resources to optimize the maintenance of security for improving the life span of the software (Mougouei, 2017). Yet, they have not been successful.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, all information related to software must be secure and the demand for secure software has increased today. Software security can be termed as the idea to secure software from malicious attacks and fraudulent persons or hackers [12][13]. Many experts have discussed many areas of security including security attributes, security management, security maintenance, etc., but still, there is something missing.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Many experts have discussed many areas of security including security attributes, security management, security maintenance, etc., but still, there is something missing. Organizations are investing both money and resources to optimize the maintenance of security for improving the life span of the software [13]. Yet, they have not been successful.…”
Section: Literature Reviewmentioning
confidence: 99%