2019
DOI: 10.1016/j.csi.2019.04.005
|View full text |Cite
|
Sign up to set email alerts
|

System security requirements: A framework for early identification, specification and measurement of related software requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(18 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…The current design phase involves a Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  broad set of activities and tasks based on the identified requirements and prepared these designed requirements into design components for the products construction phase on the next step of implementations. However, the current design phase built a design model of the product or system design structure; for instance, such designed model is used to evaluate the suitability of the proposed product and communicate the recommended product to others [35][36][37]. There are many proposed models for conventional design processes in academia and the industry; the most commonly used models are presented below: a) Generic design process: Recently, [38] defined six steps for a generic design process that are more general and can apply to any software project.…”
Section: The Results Of the Design Process Survey And Indicatorsmentioning
confidence: 99%
“…The current design phase involves a Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  broad set of activities and tasks based on the identified requirements and prepared these designed requirements into design components for the products construction phase on the next step of implementations. However, the current design phase built a design model of the product or system design structure; for instance, such designed model is used to evaluate the suitability of the proposed product and communicate the recommended product to others [35][36][37]. There are many proposed models for conventional design processes in academia and the industry; the most commonly used models are presented below: a) Generic design process: Recently, [38] defined six steps for a generic design process that are more general and can apply to any software project.…”
Section: The Results Of the Design Process Survey And Indicatorsmentioning
confidence: 99%
“…Recently, there are many published research studies on system and software security issues at the level of functional and NFRs, for instance, in Ref. [1,2] authors proposed a reference model for system NFRs allocated to software security requirements at diferent levels of details (software, system and product levels). Followed by a reference model of security requirements for early identification and measurement of security awareness program [6] where a trade-off model is proposed for software requirements to balance between security and usability issues [7].…”
Section: Functional and Non-functional Security Requirementsmentioning
confidence: 99%
“…Software 'functionalities fall under the concept of functional user requirements (FURs) and refer to the set of functions or services required from the software system, whereas constraints fall under the concept of non-functional requirements (NFRs). It should be noted that a number of such constraints, while referred to as software-NFRs by some authors, are referred to as quality aspects by others' [1].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, Meridji et al, [28] used COSMIC to measure security requirements at the function and service level to assist developers in specifying system security requirements in early development stages. To capture the security concept, this study used soft-goal inter-dependency graphs and three main security types: system availability, confidentiality and integrity.…”
Section: Related Work a Measuring Non-functional Requirements Overviewmentioning
confidence: 99%