Research Article | Open Access | Download PDF
Volume 3 | Issue 3 | Year 2013 | Article Id. IJPTT-V3I5P106 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I5P106A Systematic Security Approach in Software Requirements Engineering
P.Mahizharuvi, Dr.K. Alagarsamy
Citation :
P.Mahizharuvi, Dr.K. Alagarsamy, "A Systematic Security Approach in Software Requirements Engineering," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 3, pp. 42-45, 2013. Crossref, https://doi.org/10.14445/22492615/ IJPTT-V3I5P106
Abstract
Keywords
Software Security
References
[1]. Measuring The Software Security Requirements Engineering Process, 2012
[2]. An Effective Requirement Engineering Process Model for Software Development and Requirements Management,2010
[3]. Security Requirements Engineering: A Framework for Representation and Analysis, 2008
[4]. A common criteria based security requirements engineering process for the development of secure information systems,2009
[5]. Security Requirements Engineering; State of the Art and Research Challenges, 2008
[6]. Research Directions in Requirements Engineering, 2009
[7]. Security and Privacy Requirements Analysis within a Social Setting, 2007
[8]. Cutting Edge Practices for Secure Software Engineering,2007
[9]. A Survey on Security Patterns,2008
[10]. Software Security - The Bigger Picture,2008