Skip to main content
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mechanisms for requirements and software verification are by... more
    • by 
    •   19  
      Social PsychologySoftware EngineeringArtificial IntelligenceModeling
File is a component of a computer system that has importance value of its own, either in terms of availability, integrity, confidentiality and functionality to a system and application. If unintended changes happen on the related file, it... more
    • by 
    •   4  
      Telemedicine Applications and e-Health SystemsSecurity RequirementsLine DetectionDynamic scheduling
In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there are several security standards, like the Common Criteria... more
    • by 
    •   10  
      Computer ScienceSoftware DevelopmentSecurity EngineeringComputer Software
Security is a crucial issue in cloud computing especially since a lot of stakeholders worldwide are involved. Achieving an acceptable security level in cloud environments is much harder when compared to other traditional IT systems due to... more
    • by 
    •   5  
      SecurityAuditingCloud ComputingSecurity Requirements
Nowadays, security solutions are mainly focused on providing security defences, instead of solving one of the main reasons for security problems that refers to an appropriate Information Systems (IS) design. In fact, requirements... more
    • by 
    •   6  
      Software DevelopmentSecurity RequirementsCase StudyRequirement Engineering
One of the missions of the North American Syn-chroPhasor Initiative (NASPI) is to create a robust, widely available and secure synchronized data measurement infrastructure, dubbed NASPInet, that will improve reliability of the power grid.... more
    • by 
    •   13  
      Data AnalysisSynchronizationGlobal Positioning SystemSecurity Requirements
In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there are several security standards, like the Common Criteria... more
    • by 
    •   8  
      Software DevelopmentSecurity EngineeringComputer SoftwareSecurity Requirements
This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing are... more
    • by 
    •   7  
      Computer ScienceCloud ComputingSecurity RequirementsBusiness Model
Security facilities of information systems with high security requirements should be consistently and continuously developed, used, and maintained based on some common standards of information security. However, there is no engineering... more
    • by 
    •   15  
      Information SystemsComputer ScienceManagement Information SystemsInformation Security
Secure software engineering is a big challenge. This is mainly due to the increasing complexity, openness and extensibility of modern applications, which make a complete analysis of security requirements very hard. The overall problem... more
    • by 
    •   2  
      Software EngineeringSecurity Requirements
    • by 
    •   5  
      Information SystemsLawSecurity RequirementsBusiness Process
In the last few years, we have witnessed an explosion in demand for security measures motivated by the proliferation of mobile/wireless networks, the fixed-mobile network convergence, and the emergence of new services, such as e-commerce.... more
    • by 
    •   6  
      Distributed ComputingVirtual Private NetworkSecurity RequirementsComputer Communications
Product authentication is needed to detect counterfeit products and to prevent them from entering the distribution channels of genuine products. Security is a critical property of product authentication systems. In this paper, we study... more
    • by 
    •   8  
      Systems AnalysisSecurity RequirementsRequirement EngineeringRadio Frequency Identification
Wireless Sensor Networks (WSN) is a recent advanced technology of computer networks and electronics. The WSN increasingly becoming more practicable solution to many challenging applications. The sensor networks depend upon the sensed... more
    • by 
    •   12  
      SensorGroup communicationWireless Sensor Network SecurityIntrusion Detection
Security services based on cryptographic mechanisms assume keys to be distributed prior to secure communications. The secure management of these keys is one of the most critical elements when integrating cryptographic functions into a... more
    • by 
    •   13  
      Distributed ComputingEnvironmental ManagementCryptographySecurity Management
Due to the spreading of SMS services and appearing of new business models, value-added SMS services have been introduced. According to the research results about wide distribution of security incidents on ICT systems worldwide, in spite... more
    • by 
    •   13  
      Information and Communication technologyModel validationSecurity RequirementsProcess Improvement
    • by 
    •   14  
      Information SecuritySoftware SecuritySoftware DevelopmentSoftware Architecture
One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart-card and password. A scheme of this type is called a smart-card-based password authentication scheme. The core feature of such a scheme is... more
    • by 
    •   10  
      Distributed ComputingSecurity RequirementsProvable SecuritySmart Card
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge of security engineering. Market forces are driving software... more
    • by 
    •   15  
      Computer ScienceHuman FactorsComputer SecuritySecurity Engineering
Almost a year ago, Microsoft has introduced the .NET architecture as a new component-based programming environment, which allows for easy integration of classical distributed programming techniques with Web computing. .NETdefines a type... more
    • by 
    •   17  
      Computer ArchitectureDistributed ComputingObject Oriented ProgrammingService Oriented Architecture
The need for common understanding and agreement of functional and non-functional requirements is well known and understood by information system designers. This is necessary for both: designing the "correct" system and achieving... more
    • by  and +1
    •   7  
      Information SecurityInformation Systems SecuritySecurity RequirementsNon Functional Requirement
Inherent in any organization are security risks and barriers that must be understood, analyzed, and minimized in order to prepare for and perpetuate future growth and return on investment within the business. Likewise, company leaders... more
    • by 
    •   9  
      Mechanical EngineeringComputer ScienceSecuritySecurity Requirements
    • by 
    •   19  
      Computer ScienceObject Oriented ProgrammingInformation SecurityNetwork Security
Developing secure web applications that can withstand malicious attacks requires a careful injection of security considerations into early stages of development lifecycle. Assessing security at the requirement analysis stage of the... more
    • by 
    •   7  
      Computer ScienceInformation TechnologySoftware SecuritySecurity Requirements
As organizations increase their reliance on information systems for daily business, they become more vulnerable to security breaches. Though a number of techniques, such as encryption and electronic signatures, are currently available to... more
    • by 
    •   5  
      Access ControlDatabase SecuritySecurity RequirementsData Protection
    • by 
    •   3  
      Information ManagementSecurity RequirementsComputers Security
The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shifts individual... more
    • by 
    •   11  
      Computer ScienceComputer ArchitectureInformation TechnologyPrivacy
Recently, new families of wireless ad hoc networks have emerged for specialized applications-personal area networks. Wireless personal area networks (WPAN) is rapidly gaining popularity. A wide variety of traditional computing devices and... more
    • by 
    •   3  
      Security RequirementsWireless Sensor NetworkWireless Ad Hoc Network
This paper first positively answers the previously open question of whether it was possible to obtain an optimal security reduction for an identity based signature (IBS) under a reasonable computational assumption. We revisit the... more
    • by 
    •   3  
      Security RequirementsBoolean SatisfiabilityIdentity-Based Signature Schemes
System engineers are confronted with fast-paced technology developments, complicated contractual relationships, emerging threats and global security requirements, concerns for sustainability and viability of their ventures and a raft of... more
    • by 
    •   9  
      Information TechnologyTechnology developmentCompetitive advantageSecurity Engineering
Grid technology is increasingly being looked upon as a natural extension of the internet for engaging in complex data processing tasks over resources which are distributed across the world. Architects and developers employing grid systems... more
    • by 
    •   5  
      Security RequirementsVirtual OrganizationSecurity ModelGlobus Toolkit
IEEE 802.11 Wireless Networks have gained popularity, providing users mobility and flexibility in accessing information. Existing solutions for wireless LAN networks have been exposed to security vulnerabilities. Previous study has... more
    • by 
    •   4  
      Wireless NetworkSecurity RequirementsWireless LanSize Distribution
Almost a year ago, Microsoft has introduced the .NET architecture as a new component-based programming environment, which allows for easy integration of classical distributed programming techniques with Web computing. .NETdefines a type... more
    • by 
    •   17  
      Computer ArchitectureDistributed ComputingObject Oriented ProgrammingService Oriented Architecture
This paper reports on a study which assessed the application of information and communication technologies (ICT) in health information access and dissemination in Uganda. The project focused not only on information obtainable through... more
    • by 
    •   48  
      EntrepreneurshipBusiness EthicsMechanical EngineeringEarth Sciences
This paper presents a conceptual framework for security engineering, with a strong focus on security requirements elicitation and analysis. This conceptual framework establishes a clear-cut vocabulary and makes explicit the interrelations... more
    • by 
    •   11  
      Information SystemsInformation SecurityRequirements EngineeringSecurity Engineering
Data Warehouses (DWs) are widely accepted as the core of current decision support systems. Therefore, it is vital to incorporate security requirements from the early stages of the DWs projects and enforce them in the further design... more
    • by 
    •   10  
      Data WarehouseDecision support systemCWMComputer Software
In 2005, Lee et al. proposed a blind signature scheme based on the discrete-logarithm problem to achieve the untraceability or unlinkability property. However, the scheme will be demonstrated as not being secure in this manuscript. We... more
    • by 
    •   5  
      Security and PrivacyComputer SoftwareSecurity RequirementsBlind Signature
Smart grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. However, communication trust and security issues still present practical concerns to... more
    • by 
    •   10  
      Security RequirementsSecurity AnalysisRandom access memoryInterdisciplinary Engineering
DBSy (Domain Based Security) is a set of notations and techniques developed by QinetiQ specifically for the UK Mo D, a large distributed organisation. DBSy provides a way of describing and assessing business-driven information security... more
    • by 
    •   8  
      Information SecurityInformation Communication TechnologyInformation AssuranceRisk Analysis
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, whether implicit or explicit, affect the scope of the... more
    • by 
    •   10  
      Information SystemsSoftware EngineeringRequirements EngineeringSecurity
One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic,... more
    • by  and +1
    •   9  
      Requirements EngineeringSecurity EngineeringComputer SoftwareSecurity Requirements
Certificateless Public Key Cryptography" has very appealing features, namely it does not require any public key certification (cf. traditional Public Key Cryptography) nor having key escrow problem (cf. Identity-Based Cryptography).... more
    • by 
    •   13  
      Information SecurityModelingComputer SecurityEncryption
... More-over, customer-to-customer transfer cannot be done. This trend is also noticeable in major consortiums focusing on mobile payments, such as the StolPaN [9] consortium and the GSM Association [11]. ... [9] StolPaN – Store... more
    • by  and +2
    •   6  
      Public Key InfrastructureSecurity RequirementsSecurity AnalysisPayment System
Convergence and ubiquity are the key characteristics of tomorrows service provision infrastructures. Cloud architectures will constitute cost-efficient backbones that will support the transmission, storage, and computing of the... more
    • by 
    •   15  
      Ubiquitous ComputingSecurity in Web ServicesDistributed Denial of Service AttackTesting
The paper presents experiences with building a flexible, customer-driven security infrastructure for open collaborative applications. The experiences were gained in the framework of the Collaboratory.nl (CNL) project. The work is based on... more
    • by 
    •   10  
      Access ControlSecurity RequirementsIdentity managementVirtual Organization
This paper reports on a study which assessed the application of information and communication technologies (ICT) in health information access and dissemination in Uganda. The project focused not only on information obtainable through... more
    • by 
    •   24  
      Mechanical EngineeringEarth SciencesInformation TechnologySituation awareness
UNU-IIST is jointly funded by the government of Macao and the governments of the People's Republic of China and Portugal through a contribution to the UNU Endowment Fund. As well as providing twothirds of the endowment fund, the Macao... more
    • by 
    •   4  
      Cognitive ScienceComputer SoftwareSecurity RequirementsBoolean Satisfiability
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modularity present in the design of the protocol: the... more
    • by 
    •   7  
      Pure MathematicsSecurity RequirementsProvable SecurityCryptology
Developing secure web applications that can withstand malicious attacks requires a careful injection of security considerations into early stages of development lifecycle. Assessing security at the requirement analysis stage of the... more
    • by 
    •   7  
      Computer ScienceInformation TechnologySoftware SecuritySecurity Requirements