2010
DOI: 10.1016/j.csi.2010.01.006
|View full text |Cite
|
Sign up to set email alerts
|

A systematic review of security requirements engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
86
0
3

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 152 publications
(89 citation statements)
references
References 15 publications
0
86
0
3
Order By: Relevance
“…An overview and comparison of SRE methods can be found in [39] and [40]. Many of them are designed to analyze the problem space in systematic ways in order to identify threats, weaknesses, vulnerabilities, and attacks.…”
Section: Sre Methodsmentioning
confidence: 99%
“…An overview and comparison of SRE methods can be found in [39] and [40]. Many of them are designed to analyze the problem space in systematic ways in order to identify threats, weaknesses, vulnerabilities, and attacks.…”
Section: Sre Methodsmentioning
confidence: 99%
“…Following Fabian et al [3], Mellado et al [4] and Salini et al [5], we give the main characteristics of these methods:…”
Section: The Security Requirements Engineering Methods Reviewedmentioning
confidence: 99%
“…This characteristic is divided in integration of standards and main contributions [4]. -Security Properties: indicates the security properties accomplish by a SRE method [3].…”
Section: The Security Requirements Engineering Methods Reviewedmentioning
confidence: 99%
See 1 more Smart Citation
“…Security and privacy issues is dealt when the system has been designed and put into operation [3]. Many researchers highlighted that reducing security issues has become important.…”
Section: Problem Statementmentioning
confidence: 99%