2018
DOI: 10.1109/access.2018.2883077
|View full text |Cite
|
Sign up to set email alerts
|

Text Categorization Approach for Secure Design Pattern Selection Using Software Requirement Specification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…We adapted Text Categorization Process [19], Restricted Misuse Case Modeling [20], validating security patterns using Test Template [21] approaches to extend our Methodology. The proposed Sa-SDLC methodology, integrate security patterns mechanisms in each phase of SDLC to reduce impact of vulnerabilities.…”
Section: The Proposed Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…We adapted Text Categorization Process [19], Restricted Misuse Case Modeling [20], validating security patterns using Test Template [21] approaches to extend our Methodology. The proposed Sa-SDLC methodology, integrate security patterns mechanisms in each phase of SDLC to reduce impact of vulnerabilities.…”
Section: The Proposed Methodologymentioning
confidence: 99%
“…Requirements: To identify the security patterns, Security Requirement Specification (SRS) and Security Pattern Repository (SPR) has to be prepared [19] [22][23] as show in Table 1 and 2 respectively. Part of structure of SRS Query:…”
Section: Step 11 Identification Of Security Patterns For Securitymentioning
confidence: 99%
“…Further, the literature also showed that there is a need to develop a system that can appropriately recommend human resources at an early stage and predict the time and cost of scrum projects based on historical data. The inappropriate estimate of time and cost profoundly impacts the outcome of software projects [3,35,36,37,38].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Fourth, with the introduction of the HUMP model, the present research has grounded a base for future study of IU and AU of social networking sites. With the technological progress, security issues have also been raised [119]. In technology acceptance models, researchers should explore design and features, like technologies that improve visual and functional control designs for the users.…”
Section: Limitations and Future Researchmentioning
confidence: 99%