A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
Many approaches for modelling security requirements have been proposed,but software industry did not reach on an agreement on how to express security requirements in a system model for software architecture. The main objective of this perspective paper is to summarize the problem space of representa...
Main Authors: | Maher, Zulfikar Ahmad, Shah, Asadullah, Shaikh, Humaiz, Rahu, Ghulam Ali, Butt, Pinial Khan, Chandio, Shahmurad, Shaikh, Saima |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
IEEE Explore
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/68117/ http://irep.iium.edu.my/68117/ http://irep.iium.edu.my/68117/1/68117_A%20Methodology%20for%20Modelling%20and%20Analysis%20of%20Secure%20Systems.pdf http://irep.iium.edu.my/68117/7/68117_A%20methodology%20for%20modelling%20and%20analysis%20of%20secure%20systems_SCOPUS.pdf |
Similar Items
-
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019) -
The effect of web-based social networking on consultancy
by: Shaikh, Humaiz, et al.
Published: (2019) -
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018) -
Beyond traditional audits: the implications of information technology on auditing
by: Shaikh, Humaiz, et al.
Published: (2018) -
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)