2012
DOI: 10.5120/7671-0953
|View full text |Cite
|
Sign up to set email alerts
|

A Knowledge-oriented Approach to Security Requirements for an E-Voting System

Abstract: In this paper, we introduce a knowledge-oriented approach for the Security Requirements Engineering phase for developing E-Voting System. The knowledge acquired through the process of eliciting and analyzing secure E-Voting System is represented in the form of UML models; which can be made available to future developers and the dependency towards security experts can be reduced. In this paper we present a set of security requirements and security requirements patterns that were developed based on the aforement… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
5

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(20 citation statements)
references
References 13 publications
0
15
0
5
Order By: Relevance
“…However, we can identify works that address other research issues, namely: Requirements [16], [3], [27], [29]; Audit [17], [21], [23], [24]; Knowledge Management [12], [22], [34], [40].…”
Section: Discussion and Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…However, we can identify works that address other research issues, namely: Requirements [16], [3], [27], [29]; Audit [17], [21], [23], [24]; Knowledge Management [12], [22], [34], [40].…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…A top-level ontology of security requirements is presented in [3] by Salini & Kanmani. Based on this ontology, we can design and develop requirements for electronic voting systems (e-voting).…”
Section: Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…Daramola et al [11] Ivankina et al [10] Lashras et al [12] Salini et al [13] Dritsas et al Most of the security ontologies used in the SRE contain the concept of "Asset". Given that security issues affect all the infrastructure of organizations, other concepts were introduced (with their corresponding sub-classes): Location, Organization and Person.…”
Section: Concepts Of the Ontologymentioning
confidence: 99%