Requirements Engineering of Software Security : Litterature review from Elicitation to Specification
Dublin Core | PKP Metadata Items | Metadata for this Document | |
1. | Title | Title of document | Requirements Engineering of Software Security : Litterature review from Elicitation to Specification |
2. | Creator | Author's name, affiliation, country | Meryem Kassou; ENSIAS, Mohammed V University - Souissi; Morocco |
2. | Creator | Author's name, affiliation, country | Laila Kjiri; ENSIAS, Mohammed V University - Souissi; Morocco |
3. | Subject | Discipline(s) | |
3. | Subject | Keyword(s) | |
4. | Description | Abstract | Nowadays Security plays an important role in the development of applications because of network expansion on one side and of the importance of information on the other side. However, security requirements have long been relegated to second place compared to the functional requirements which can cause some damage to the applications. One of the challenges of current research in the area of requirement engineering is to develop simple, expressive, reliable and costless methods for expressing and modelling security requirements. The purpose of this article is to review research studies related to approaches for eliciting and specifying security requirements in the context of software development process. It aims then to analyse and classify them into categories and to highlight their contribution to security requirements engineering field and their limits. |
5. | Publisher | Organizing agency, location | |
6. | Contributor | Sponsor(s) | |
7. | Date | (YYYY-MM-DD) | 2012-03-15 |
8. | Type | Status & genre | Peer-reviewed Article |
8. | Type | Type | |
9. | Format | File format | PDF (Français (France)) |
10. | Identifier | Uniform Resource Identifier | https://www.revue-eti.net/index.php/eti/article/view/12 |
11. | Source | Title; vol., no. (year) | Electronic Journal of Information Technology; Issue 6 |
12. | Language | English=en | |
13. | Relation | Supp. Files | |
14. | Coverage | Geo-spatial location, chronological period, research sample (gender, age, etc.) | |
15. | Rights | Copyright and permissions |
Copyright (c) 2012 Meryem Kassou, Laila Kjiri This work is licensed under a Creative Commons Attribution 4.0 International License. |