154,102 Hits in 4.9 sec

Cross-project Classification of Security-related Requirements [article]

Mazen Mohamad and Jan-Philipp Steghöfer and Riccardo Scandariato
2020 arXiv   pre-print
We investigate the feasibility of using a classifier for security-related requirements trained on requirement specifications available online.  ...  Our work is motivated by the need to identify security requirements for the creation of security assurance cases that become a necessity for many organizations with new and upcoming standards like GDPR  ...  The three-phased methodology we followed to design and validate the cross-project classification of security requirements.  ... 
arXiv:2003.14134v1 fatcat:xhv3yzlmpvhmtklvviqnatgvoi

Supporting Requirements Engineers in Recognising Security Issues [chapter]

Eric Knauss, Siv Houmb, Kurt Schneider, Shareeful Islam, Jan Jürjens
2011 Lecture Notes in Computer Science  
Context & motivation: More and more software projects today are security-related in one way or the other.  ...  Question/problem: Ignoring security issues early in a project is a major source of recurring security problems in practice.  ...  During pre-classification, we encountered another type of requirements: Security-related requirement: (i) A requirement that gives (functional) details of security requirements, or (ii) a requirement which  ... 
doi:10.1007/978-3-642-19858-8_2 fatcat:txxti6ja7ba6xncgraoa3ablym

Functionalities of free and open electronic health record systems

Alejandro Enrique Flores Zuniga, Khin Than Win, Willy Susilo
2010 International Journal of Technology Assessment in Health Care  
Communication, privacy, and security requirements are accomplished in less than 23 percent of the cases, mainly at minimal functional level.  ...  The limited functionalities are likely to become requirements for further releases of open-source EHR systems.  ...  The classification of requirements is shown in Table 1 .  ... 
doi:10.1017/s0266462310001121 pmid:20974022 fatcat:m7e77intpney3lrcocxymyo25q

Page 11166 of The Federal Register / FIND Vol. 76, Issue 40 [page]

2011 The Federal Register / FIND  
its financial obligations, even under adverse conditions, for the projected life of the security.  ...  An FCU’s authority to purchase mortgage related securities comes firom § 107(15)(b) of the Act, 12 U.S.C. 1757(15)(b), which defines mortgage related security by cross reference to the same phrase in §  ... 

Reference Architectures, Platforms, and Pilots for European Smart and Healthy Living—Analysis and Comparison

Andrej Grguric, Omar Khan, Ana Ortega-Gil, Evangelos K. Markakis, Konstantin Pozdniakov, Christos Kloukinas, Alejandro M. Medrano-Gil, Eugenio Gaeta, Giuseppe Fico, Konstantina Koloutsou
2021 Electronics  
We present a classification of selected projects based on established taxonomies and map projects' architectures to CREATE-IoT 3D RAM, which we also propose as standard RAM for future digital healthcare  ...  and AAL projects.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10141616 fatcat:tkcu6nzshbcrnb5u6wcxpxwxoy

Page 41265 of The Federal Register / FIND Vol. 52, Issue 206 [page]

1987 The Federal Register / FIND  
Assistance Audit requirements Block grant activities and projects Book-entry securities of GNMA Building product standards Commitment, master conditional. Community development.  ...  FTE Clinical laboratories 778 Diagnostic-related group classification system 753 DRG classification system ....878 Fire safety standards ... 844 Hospices 785 Inpatient hospita 881 Insurance «+986 Low-income  ... 

Toward sensitive information redaction in a collaborative, multilevel security environment

Peter Gehres, Nathan Singleton, George Louthan, John Hale
2010 Proceedings of the 6th International Symposium on Wikis and Open Collaboration - WikiSym '10  
The model allows for each page to be viewed at appropriate levels of classification transparently included or excluded based on the user's access level.  ...  , privacy, or security concerns.  ...  Philippe Beaudette, Head of Reader Relations, Wikimedia Foundation, whose knowledge of everything wiki has been instrumental in the development of this project.  ... 
doi:10.1145/1832772.1832793 dblp:conf/wikis/GehresSLH10 fatcat:v7sztboqlban7cornpppa4gzfi

Learning to Catch Security Patches [article]

Arthur D. Sawadogo and Tegawendé F. Bissyandé and Naouel Moha and Kevin Allix and Jacques Klein and Li Li and Yves Le Traon
2020 arXiv   pre-print
In this paper, we propose a Co-Training-based approach to catch security patches as part of an automatic monitoring service of code repositories.  ...  Leveraging different classes of features, we empirically show that such automation is feasible and can yield a precision of over 90% in identifying security patches, with an unprecedented recall of over  ...  RQ2: Cross-project classification In the wild of software development projects, as reflected by the case of OpenSSL, there can be limitations in the available labeled data.  ... 
arXiv:2001.09148v1 fatcat:5lkslbrzhjdgpibbsio2mnlulu

Decision Support for Security-Control Identification Using Machine Learning [chapter]

Seifeddine Bettaieb, Seung Yeob Shin, Mehrdad Sabetzadeh, Lionel Briand, Grégory Nou, Michael Garceau
2019 Lecture Notes in Computer Science  
Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security.  ...  The elaboration of security requirements for a given system is in part guided by the controls envisaged by the applicable security standards and best practices.  ...  28] , identifying non-functional requirements [3] , and requirements classification [17] .  ... 
doi:10.1007/978-3-030-15538-4_1 fatcat:h7kohimslndrfgsbhpltjz36tu

Text Filtering and Ranking for Security Bug Report Prediction

Fayola Peters, Thein Tun, Yijun Yu, Bashar Nuseibeh
2017 IEEE Transactions on Software Engineering  
More critically, we have observed that the presence of security related keywords in both security and non-security bug reports can lead to the mislabelling of security bug reports.  ...  Security bug reports can describe security critical vulnerabilities in software products. Bug tracking systems may contain thousands of bug reports, where relatively few of them are security related.  ...  Security cross words denote the use of the same security related keywords in both security and non-security bug reports.  ... 
doi:10.1109/tse.2017.2787653 fatcat:u3lz3flodbffla4szbvisuc2na

Cross-Border Cooperation: Challenges and Perspectives for the Horizontal Dimension of European Integration
Трансграничное сотрудничество: вызовы и перспективы для горизонтального измерения европейской интеграции власть и экономика

Joachim Beck
2018 Administrative Consulting  
Regarding the criteria of thematic differentiation a task-classification can lead to the following typology (Beck 2017): type A: Cooperation within the framework of mono-thematic projects (bridges, bike  ...  A classification of these various tasks, as relevant for the question of the challenge of cross-border institution-building, can be developed on the basis of the dimensions of «thematic orientation» and  ...  Regarding the criteria of thematic differentiation a task-classification can lead to the following typology (Beck 2017): type A: Cooperation within the framework of mono-thematic projects (bridges, bike  ... 
doi:10.22394/1726-1139-2018-2-32-42 fatcat:g4oex7znafdcpk5rze5rel3ea4

Building Secure Web-Applications Using Threat Model

Sobia Usman, Humera Niaz
2018 International Journal of Information Technology and Computer Science  
Ensuring security in web based applications is one of the key issues nowadays. The processes of designing and building a web site have changed.  ...  As the online transactions are increasing, increase in type and number of attacks have been observed regarding security of online payment systems.  ...  threats > Number of Requirements (related to security) which shows that there is relationship between security threats and security related requirements i.e. all the security threats are not stated/handled  ... 
doi:10.5815/ijitcs.2018.03.06 fatcat:dbunmbgyfbg7lccjs76xy4efpa

Trace-by-classification: A machine learning approach to generate trace links for frequently occurring software artifacts

Mateusz Wieloch, Sorawit Amornborvornwong, Jane Cleland-Huang
2013 2013 7th International Workshop on Traceability in Emerging Forms of Software Engineering (TEFSE)  
Examples include quality concerns related to non-functional requirements such as security, performance, and usability; regulatory codes that are applied across multiple systems; and architectural-decisions  ...  , and set of target artifacts, such as a set of java classes.  ...  of projects, and (2) tracing HIPAA ( Health Insurance Portability and Accountability Act (HIPAA) of 1996) technical safeguards to product level requirements in health care related products.  ... 
doi:10.1109/tefse.2013.6620165 dblp:conf/icse/WielochAC13 fatcat:nr3yjw2izvhejpa6c4yzmvanmu

Page 37365 of The Federal Register / FIND Vol. 55, Issue 176 [page]

1990 The Federal Register / FIND  
SECURITY CLASSIFICATION: None. SYSTEM LOCATION: Health Care Financing Administration Bureau of Data Management and Strategy, 6325 Security Bivd., Baltimore, - Md. 21207.  ...  epidemiological project related to the prevention of disease or disability, or the restoration or maintenance of health if HCFA: a.  ... 

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts

Maria Riaz, Jason King, John Slankas, Laurie Williams
2014 2014 IEEE 22nd International Requirements Engineering Conference (RE)  
Of these, 28% explicitly mention security while 72% of the sentences are functional requirements with security implications.  ...  The goal of this research is to aid requirements engineers in producing a more comprehensive and classified set of security requirements by (1) automatically identifying security-relevant sentences in  ...  BACKGROUND AND RELATED WORK In this section, we discuss the background of security objectives, and related work in requirement classifications and security requirements engineering. A.  ... 
doi:10.1109/re.2014.6912260 dblp:conf/re/RiazKSW14 fatcat:ixj4usrqkfgg3jtg5k7phgfxca
« Previous Showing results 1 — 15 out of 154,102 results