A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
Writing quality security requirements contributes to the success of secure software development. It has been a common practice to include security requirements in a software system after the system is defined. Thus, incorporating security requirements at a later stage of software development will in...
| Main Author: | Mustafa, Nuridawati |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/25165/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=118433 |
| Abstract | Abstract here |
Similar Items
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020)
by: Mustafa, Nuridawati
Published: (2020)
A Software Requirements Defect Management Approach Using Negotiation Technique To Improve Software Requirements Quality
by: Rosmadi, Nurul Atikah
Published: (2018)
by: Rosmadi, Nurul Atikah
Published: (2018)
Customization Of Requirements Modeling Tool For Software Engineering Education
by: Subhiyakto, Egia Rosi
Published: (2014)
by: Subhiyakto, Egia Rosi
Published: (2014)
Tool-assisted model for software requirement negotiation
by: Lau, Hong Sheng
Published: (2015)
by: Lau, Hong Sheng
Published: (2015)
A Framework For Classification Software Security Using Common Vulnerabilities And Exposures
by: Hassan, Nor Hafeizah
Published: (2018)
by: Hassan, Nor Hafeizah
Published: (2018)
Requirements engineering practices model for software development outsourcing issues / Javed Iqbal
by: Javed , Iqbal
Published: (2016)
by: Javed , Iqbal
Published: (2016)
Completion time driven hyper-heuristic approach for optimisation of scientific workflow scheduling in cloud environment / Ehab Nabiel Mohammad
by: Ehab Nabiel , Mohammad
Published: (2018)
by: Ehab Nabiel , Mohammad
Published: (2018)
Template neural particle optimization for vehicle license plate recognition
by: A Jalil, Norazira
Published: (2015)
by: A Jalil, Norazira
Published: (2015)
Establishing Conducive Environment For Better Software Development Process : A Study On The Integraded Cargo Community Clearance Application (ICCCA) Project
by: Tan, Sim Yong
Published: (2002)
by: Tan, Sim Yong
Published: (2002)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Dynamic fast local Laplacian completed local ternary pattern (dynamic FLapCLTP) for face recognition
by: Sam, Yin Yee
Published: (2020)
by: Sam, Yin Yee
Published: (2020)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
by: Noraini, Mohd Noor
Published: (2011)
A semantic interoperability framework for software as a service systems in cloud computing environments / Reza Rezaei
by: Reza, Rezaei
Published: (2014)
by: Reza, Rezaei
Published: (2014)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
Bayesian random forests for high-dimensional classification and regression with complete and incomplete microarray data
by: Oyebayo, Olaniran Ridwan
Published: (2018)
by: Oyebayo, Olaniran Ridwan
Published: (2018)
Development Of Teleresearch Model Using Open Source Software
by: Rajendaran, Chellappan Pillai
Published: (2008)
by: Rajendaran, Chellappan Pillai
Published: (2008)
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
by: Chong, Chun Yong
Published: (2016)
by: Chong, Chun Yong
Published: (2016)
Ontology-driven and template-based approach for usability requirements elicitation and specification
by: Too, Chian Wen
Published: (2018)
by: Too, Chian Wen
Published: (2018)
Requirement Model for Instructor Management System
by: Lee, Ai Leng
Published: (2004)
by: Lee, Ai Leng
Published: (2004)
Requirement Model For Class Management System (CMS)
by: Nurul Izzah, Maharudin
Published: (2007)
by: Nurul Izzah, Maharudin
Published: (2007)
Requirement Model for UUM E-Alumni Club
by: Amarah, Burhan Daoud As'ad
Published: (2008)
by: Amarah, Burhan Daoud As'ad
Published: (2008)
Requirement Model for Water Billing Information System
by: Zainal Abidin, Shariff Ghazali
Published: (2004)
by: Zainal Abidin, Shariff Ghazali
Published: (2004)
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
by: Noor Hasrina, Bakar
Published: (2016)
by: Noor Hasrina, Bakar
Published: (2016)
A Requirement Model for Online Auction System for UUM
by: Aulia, Rachmat
Published: (2008)
by: Aulia, Rachmat
Published: (2008)
Requirement Model for POLIMAS Examination Evaluation System (PEES)
by: Amyzah, Ahmad
Published: (2006)
by: Amyzah, Ahmad
Published: (2006)
The Requirement Model of a Ploughing Incentive Information System
by: Norfazlin, Rashid
Published: (2011)
by: Norfazlin, Rashid
Published: (2011)
Tool Enhancement For Collaborative Software Engineering Education
by: Utomo, Danang Wahyu
Published: (2014)
by: Utomo, Danang Wahyu
Published: (2014)
Employees Training Management System In KUIN: A Requirement Model.
by: Norzaila, Mohamad Nor
Published: (2007)
by: Norzaila, Mohamad Nor
Published: (2007)
Requirement Model Of Mobile Examination Result For Student CAS In UUM
by: Brebish, Nabil AB. A.
Published: (2008)
by: Brebish, Nabil AB. A.
Published: (2008)
Requirements Model for Universiti Utara Malaysia Library Data Warehouse
by: Alwan, Haider Abdulkadhim
Published: (2012)
by: Alwan, Haider Abdulkadhim
Published: (2012)
A goal oriented measurement of test case quality assessment model for agile software development
by: Barraood, Samera Obaid Al-Barak
Published: (2023)
by: Barraood, Samera Obaid Al-Barak
Published: (2023)
Secure System Development with UMLSEC : Application to a B2B System
by: Khairul Anwar, Sedek
Published: (2004)
by: Khairul Anwar, Sedek
Published: (2004)
Density subspace clustering: a case study on perception of the required skill
by: Sembiring, Rahmat Widia
Published: (2014)
by: Sembiring, Rahmat Widia
Published: (2014)
A Study on Network Infrastructure Requirement for Kubang Pasu Land Office
by: Syarifah Adilah, Mohamed Yusoff
Published: (2004)
by: Syarifah Adilah, Mohamed Yusoff
Published: (2004)
3D audio visual courseware requirements for training self-care skills for children with autism
by: Farah Nazmin, Kamarudin
Published: (2014)
by: Farah Nazmin, Kamarudin
Published: (2014)
Estimation technique for software project planning
by: Periasamy, Sobah
Published: (2010)
by: Periasamy, Sobah
Published: (2010)
The development of optical stiffness calibration software base on equipartition theorem, boltzman statistics and power spectrum density
by: Muhammad Yunus Hamid
Published: (2018)
by: Muhammad Yunus Hamid
Published: (2018)
Density based subspace clustering: a case study on perception of the required skill
by: Rahmat Widia, Sembiring
Published: (2014)
by: Rahmat Widia, Sembiring
Published: (2014)
GRAT : groupware supported requirements analysis tool / Veleswaran a/l Nallaiah.
by: Nallaiah, Veleswaran
Published: (2004)
by: Nallaiah, Veleswaran
Published: (2004)
A Requirement Model for Online Dental Reservation System for University Health Center
by: Said, Mohamed Ahmed
Published: (2008)
by: Said, Mohamed Ahmed
Published: (2008)
Similar Items
-
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020) -
A Software Requirements Defect Management Approach Using Negotiation Technique To Improve Software Requirements Quality
by: Rosmadi, Nurul Atikah
Published: (2018) -
Customization Of Requirements Modeling Tool For Software Engineering Education
by: Subhiyakto, Egia Rosi
Published: (2014) -
Tool-assisted model for software requirement negotiation
by: Lau, Hong Sheng
Published: (2015) -
A Framework For Classification Software Security Using Common Vulnerabilities And Exposures
by: Hassan, Nor Hafeizah
Published: (2018)
