2019
DOI: 10.1007/s13369-019-04067-3
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Review and Analytical Evaluation of Security Requirements Engineering Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 73 publications
0
3
0
Order By: Relevance
“…Conducting an error-free survey and minimizing the biasness up to the highest level was also the core priority of this study. However, there are some threats that do exist and while conducting a systematic review, they may harm the validity of the study [73]. These include a selection of limited digital databases and search engines, imperfection in the retrieval of research papers, inaccuracy in the framing of inclusion-exclusion parameters, biasness in setting QA questions.…”
Section: Validationmentioning
confidence: 99%
See 1 more Smart Citation
“…Conducting an error-free survey and minimizing the biasness up to the highest level was also the core priority of this study. However, there are some threats that do exist and while conducting a systematic review, they may harm the validity of the study [73]. These include a selection of limited digital databases and search engines, imperfection in the retrieval of research papers, inaccuracy in the framing of inclusion-exclusion parameters, biasness in setting QA questions.…”
Section: Validationmentioning
confidence: 99%
“…External Validity: It ensures the generalization of the results, or we can say that it defines the applicability of the results. Here, our generated results are dependent on the search engines of specified digital libraries [73]. Every search engine and the digital repository have some kind of limitations in generating accurate results.…”
Section: Validationmentioning
confidence: 99%
“…The rising number of security problems in recent years, forced the research community to put security concerns at the top of their list of priorities (Anwar Mohammad et al, 2019). Security should be a part of the whole SDLC process, and it should be a part of it right from the start, in the requirements phase (Mahmood et al, 2022;Sonmez & Kilic, 2021).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Model-oriented security requirements engineering (MORSE) has been used in web-based E-Health applications (Li et al, 2017). Misuse instances are another technique for eliciting security requirements (Anwar Mohammad et al, 2019), Misuse cases were presented to capture security threats and requirements (Zareen et al, 2020). Security requirement frameworks should be contained in any the SDLC process to enhance the development methodology, such as SQUARE Anwar Mohammad et al (2019); Qadir & Ahmad (2022) Mufti et al (2018), CLASP Qadir & Ahmad, (2022) Mufti et al (2018), secure i* , UMLsec Mohammad et al (2019), SREP (Mufti et al, 2018), secure Tropos Mohammad et al (2019), MORSE Prabhakaran & Selvadurai (2018) and many more.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The term RE is broadly defined as the application of engineering activities to the development of formal software requirements. This includes the process of defining, documenting and maintaining the requirements, as well as identifying stakeholders of the system and their demands (Mohammad et al. , 2019).…”
Section: Background and Related Workmentioning
confidence: 99%