2005
DOI: 10.21236/ada443493
|View full text |Cite
|
Sign up to set email alerts
|

Security Quality Requirements Engineering (SQUARE) Methodology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
97
1
2

Year Published

2006
2006
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 145 publications
(100 citation statements)
references
References 0 publications
0
97
1
2
Order By: Relevance
“…Existing approaches for security requirement specification have variety of shortcomings [11]. The main shortcoming is that they do not provide sufficient support for security requirements to be traced and used at the later stages of development lifecycle.…”
Section: Contributions Of the Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Existing approaches for security requirement specification have variety of shortcomings [11]. The main shortcoming is that they do not provide sufficient support for security requirements to be traced and used at the later stages of development lifecycle.…”
Section: Contributions Of the Proposed Methodsmentioning
confidence: 99%
“…References for each of these SRE methods have also been given in [3]. Selected SRE methods were CLASP [5], Misuse Cases, USeR method, abuser stories, secure TROPOS, SQUARE [11], Anti-Models, and security Problems Frames etc.…”
Section: Problem Definition and Related Workmentioning
confidence: 99%
“…Tondel et al [9] has provided an extensive survey on security requirements methods which help to identify security requirements systematically and structure them. For example, Mead [10] for the SEI's (software Engineering Institute) has identified a method known as SQUARE (Secure Quality Requirements Engineering) and our earlier work on SysSQUARE [8] which has been extended to address Enterprise Cloud security EC-SQUARE (Enterprise Cloud security), is shown in Figure 1, towards enterprises security engineering method. Our extended method consists of nine steps as follow [5,8]:…”
Section: Enterprise Security Framework For Enterprise Cloudmentioning
confidence: 99%
“…Identifying goal is one of the initial step in requirement engineering [3,6,7]. These goals provide a reference frame for identifying privacy and security that implied to requirements that are initially identified [3].…”
Section: Introductionmentioning
confidence: 99%