|
|
|
Christian Schmitt,Peter Liggesmeyer
Pág. 15 - 34
This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security infor...
ver más
|
|
|
|
|
|
|
Yuelei Xiao and Haiqi Li
Privacy preserving data publishing has received considerable attention for publishing useful information while preserving data privacy. The existing privacy preserving data publishing methods for multiple sensitive attributes do not consider the situatio...
ver más
|
|
|
|
|
|
|
Frank Moses,Kurt Sandkuhl
Pág. 54 - 68
The increasing digitalization of enterprises and public authorities has resulted in the growing importance of information technology in everyday operations. In this context, an information security management system (ISMS) has become an essential aspect ...
ver más
|
|
|
|
|
|
|
Erika Nazaruka
Pág. 28 - 43
Specification and traceability of security requirements is still a challenge since modeling and analysis of security aspects of systems require additional efforts at the very beginning of software development. The topological functioning model is a forma...
ver más
|
|
|
|
|
|
|
Sungchae Park and Heung-Youl Youm
As COVID-19 became a pandemic worldwide, contact tracing technologies and information systems were developed for quick control of infectious diseases in both the private and public sectors. This study aims to strengthen the data subject?s security, priva...
ver más
|
|
|
|
|
|
|
Saima Zareen, Adeel Akram and Shoab Ahmad Khan
This work can be applied with the Requirements Engineering Process to elicit the security requirements for an information system?s development.
|
|
|
|
|
|
|
Maram Fahaad Almufareh and Mamoona Humayun
Security and performance (SAP) are two critical NFRs that affect the successful completion of software projects. Organizations need to follow the practices that are vital to SAP verification. These practices must be incorporated into the software develop...
ver más
|
|
|
|
|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Sang-Hyun Lee, Makoto Taniguchi, Rabi H. Mohtar, Jin-Yong Choi and Seung-Hwan Yoo
The aim of this study is to assess the impact of rice-based food security on water, energy, land, and CO2 emissions from a holistic point of view using the Nexus approach, which analyzes tradeoffs between water, energy, and food management. In Japan, bot...
ver más
|
|
|
|
|
|
|
|
Christian Esposito, Ross Horne, Livio Robaldo, Bart Buelens and Elfi Goesaert
The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, se...
ver más
|
|
|
|
|
|
|
?arunas Grigaliunas, Michael Schmidt, Rasa Bruzgiene, Panayiota Smyrli and Vladislav Bidikov
A surge in successful Information Security (IS) breaches targeting Research and Education (R&E) institutions highlights a pressing need for enhanced protection. Addressing this, a consortium of European National Research and Education Network (NREN) ...
ver más
|
|
|
|
|
|
|
Kosuke Ito, Shuji Morisaki and Atsuhiro Goto
This study proposes a security-quality-metrics method tailored for the Internet of things (IoT) and evaluates conformity of the proposed approach with pertinent cybersecurity regulations and guidelines for IoT. Cybersecurity incidents involving IoT devic...
ver más
|
|
|
|
|
|
|
Amir Dirin,Teemu.H Laine,Ari Alamäki
Pág. pp. 177 - 196
The objective of this study was to unveil the importance of emotions and feelings in developing mobile-based tourism applications. We gathered and analyzed emotional requirements to develop a mobile context-aware application for tourists. Emotional requi...
ver más
|
|
|
|
|
|
|
Keundug Park and Heung-Youl Youm
The volume of the asset investment and trading market can be expanded through the issuance and management of blockchain-based security tokens that logically divide the value of assets and guarantee ownership. This paper proposes a service model to solve ...
ver más
|
|
|
|
|
|
|
Sabina Szymoniak, Filip Depta, Lukasz Karbowiak and Mariusz Kubanek
Artificial Intelligence is an indispensable element of the modern world, constantly evolving and contributing to the emergence of new technologies. We meet it in everyday applications, primarily using intelligent systems that aim to improve our lives. Ar...
ver más
|
|
|
|
|
|
|
Keundug Park and Heung-Youl Youm
This paper proposes a solution to the transfer problem between blockchain-based heterogeneous cryptocurrencies and CBDCs, with research derived from an analysis of the existing literature. Interoperability between heterogeneous blockchains has been an ob...
ver más
|
|
|
|
|
|
|
Dimitra Georgiou and Costas Lambrinoudakis
Currently, there are several challenges that cloud-based healthcare systems around the world are facing. The most important issue is to ensure security and privacy, or in other words, to ensure the confidentiality, integrity, and availability of the data...
ver más
|
|
|
|
|
|
|
Pavel Smirnov,Stanislav Smyshlyaev
Pág. 77 - 84
The task of providing security to remote digital signature systems (?cloud? signature) for cases of end user running client-side components on devices without potential of ensuring trusted environment (most common examples of such devices are smartphones...
ver más
|
|
|
|
|
|
|
Donatas Ma?eika and Rimantas Butleris
This paper presents how Model-Based System Engineering (MBSE) could be leveraged in order to mitigate security risks at an early stage of system development. Primarily, MBSE was used to manage complex engineering projects in terms of system requirements,...
ver más
|
|
|
|