2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) 2020
DOI: 10.1109/worlds450073.2020.9210330
|View full text |Cite
|
Sign up to set email alerts
|

Security requirements elicitation: A smart health case

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Drawing from the existing base of knowledge, continuous improvement is a central aspect of the ISO security standards. This translates into a cyclical security management procedure [5]. Using a PDCA cycle [25], operational monitoring would take place during the "Do" and "Check" phases.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Drawing from the existing base of knowledge, continuous improvement is a central aspect of the ISO security standards. This translates into a cyclical security management procedure [5]. Using a PDCA cycle [25], operational monitoring would take place during the "Do" and "Check" phases.…”
Section: Methodsmentioning
confidence: 99%
“…This method would provide security managers with proper knowledge to track fundamental causes, such as asset vulnerabilities, unaccomplished tasks and accountabilities. In our previous studies, we described ASTESJ ISSN: 2415-6698 our generic framework dedicated to information security management, extracted security concepts for SysML profiles [4] as well their application in security requirement management [5]. In this paper, we examine the responsibility issue and illustrate it using a case study.…”
Section: Introductionmentioning
confidence: 99%