Syazwani Yahya, M. Kamalrudin, Safiah Sidek, Munaliza Jaimun, Junaidah Yusof, A. Hua, P. Gani
{"title":"一篇综述论文:安全软件开发的安全需求模式","authors":"Syazwani Yahya, M. Kamalrudin, Safiah Sidek, Munaliza Jaimun, Junaidah Yusof, A. Hua, P. Gani","doi":"10.1109/AiDAS47888.2019.8971014","DOIUrl":null,"url":null,"abstract":"Security requirements are the major reasons for secure software developments. Many methods, model and approaches have been designed by many researchers to ensure a correct built of security requirement. The security patterns approach aims to benefit security requirements by allowing requirement engineers who are not security experts to better identifying and understanding security concerns and leads to a correct implementation. In this study, we evaluate various security patterns that existed in Software Requirements Engineering. Based on a literature search conducted traditionally, we report our findings on classifying and structuring this security requirements patterns. Derived from this study, a future direction for our research is clarified.","PeriodicalId":227508,"journal":{"name":"2019 1st International Conference on Artificial Intelligence and Data Sciences (AiDAS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Review Paper: Security Requirement Patterns for a Secure Software Development\",\"authors\":\"Syazwani Yahya, M. Kamalrudin, Safiah Sidek, Munaliza Jaimun, Junaidah Yusof, A. Hua, P. Gani\",\"doi\":\"10.1109/AiDAS47888.2019.8971014\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security requirements are the major reasons for secure software developments. Many methods, model and approaches have been designed by many researchers to ensure a correct built of security requirement. The security patterns approach aims to benefit security requirements by allowing requirement engineers who are not security experts to better identifying and understanding security concerns and leads to a correct implementation. In this study, we evaluate various security patterns that existed in Software Requirements Engineering. Based on a literature search conducted traditionally, we report our findings on classifying and structuring this security requirements patterns. Derived from this study, a future direction for our research is clarified.\",\"PeriodicalId\":227508,\"journal\":{\"name\":\"2019 1st International Conference on Artificial Intelligence and Data Sciences (AiDAS)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 1st International Conference on Artificial Intelligence and Data Sciences (AiDAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AiDAS47888.2019.8971014\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 1st International Conference on Artificial Intelligence and Data Sciences (AiDAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AiDAS47888.2019.8971014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Review Paper: Security Requirement Patterns for a Secure Software Development
Security requirements are the major reasons for secure software developments. Many methods, model and approaches have been designed by many researchers to ensure a correct built of security requirement. The security patterns approach aims to benefit security requirements by allowing requirement engineers who are not security experts to better identifying and understanding security concerns and leads to a correct implementation. In this study, we evaluate various security patterns that existed in Software Requirements Engineering. Based on a literature search conducted traditionally, we report our findings on classifying and structuring this security requirements patterns. Derived from this study, a future direction for our research is clarified.