22,355 Hits in 11.2 sec

Privacy and Security in Requirements Engineering: Results from a Systematic Literature Mapping

Dorgival Netto, Mariana Maia Peixoto, Carla Silva
2019 Workshop em Engenharia de Requisitos  
This paper presents the results of a Systematic Literature Mapping, covers the period from 2000 to 2016, whose goal is to understand the current state of approaches concerning privacy and security in RE  ...  In this scenario, the literature reports that it is necessary to address privacy and security from the Requirements Engineering (RE) phase.  ...  Conclusions This paper, in particular, presented the results of a Systematic Literature Mapping whose goal is to understand the state-of-the-art of Privacy and Security in RE.  ... 
dblp:conf/wer/NettoPS19 fatcat:mzvt45cnyjcjrhgqb3eeg5ah7q

Designing Security and Privacy Requirements in Internet of Things: A Survey [article]

Nada Alhirabi, Omer Rana, Charith Perera
2019 arXiv   pre-print
Due to above complexities, more often non-functional requirements (such as security and privacy) tend to get ignored in IoT application development process.  ...  In this paper, we have reviewed techniques, methods and tools that are being developed to support incorporating security and privacy requirements into traditional application designs.  ...  The following section presents a systematic literature review that investigates the available nonfunctional requirements (security and privacy) notations and produces a comprehensive analysis for each  ... 
arXiv:1910.09911v1 fatcat:77tyqetnbfhynnhkrxjezwxq6a

Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign [article]

Blagovesta Kostova, Seda Gürses, Carmela Troncoso
2020 arXiv   pre-print
Academic privacy engineering literature typically abstracts away such conditions of software production in order to achieve generalizable results.  ...  Yet, through a systematic study of the literature, we show that proposed solutions inevitably make assumptions about software architectures, development methods and scope of designer control that are misaligned  ...  We consider the following aspects: • Systematization: The paper reviews a (part of) the literature and provides an organization/comparison/systematization (e.g., a taxonomy, a hierarchy, a mapping to the  ... 
arXiv:2007.08613v1 fatcat:2tqaxp3uhfhmrngqkmoysmrkm4

Guidelines for Systematic Mapping Studies in Security Engineering [article]

Michael Felderer, Jeffrey C. Carver
2018 arXiv   pre-print
This chapter provides methodological support for systematic mapping studies in security engineering based on examples from published security engineering papers.  ...  A systematic mapping study "maps" a research area by classifying papers to identify which topics are well-studied and which need additional study.  ...  Summary This chapter provides guidelines for SMSs in security engineering based upon specific examples drawn from published security engineering SMSs.  ... 
arXiv:1801.06810v1 fatcat:indjuhux7rhtjipnrj7dpagmra

Automation Potentials in Privacy Engineering

Christian Zimmermann
2020 Open Identity Summit  
Based on a privacy engineering reference process, this paper systematically investigates automation potential in privacy engineering.  ...  In particular, it discusses potentials and implications of automation in privacy engineering and illustrates directions for future research.  ...  In order to discuss privacy engineering in a systematic manner, I first present and discuss a privacy engineering reference process in Section 2.  ... 
doi:10.18420/ois2020_10 dblp:conf/openidentity/Zimmermann20 fatcat:jc3h2lbzpve3njvyvcjezt7cc4

Engineering Privacy Revisited

2012 Journal of Computer Science  
Problem statement: Information Privacy Engineering (IPE) is the field that studies the protection of privacy in information and communication systems.  ...  The theoretical, technological and applications aspects of IPE require a framework that provides a general view and a systematic structure for the discipline's topics.  ...  Notice as a map: As a "methodology for systematically engineering privacy friendliness," Spiekermann and Cranor (2009) introduce the "notice and choice" approach based on the principles of Fair Information  ... 
doi:10.3844/jcssp.2012.107.120 fatcat:rqszo6c555g5fn7horljsxbehu

Reusable knowledge in security requirements engineering: a systematic mapping study

Amina Souag, Raúl Mazo, Camille Salinesi, Isabelle Comyn-Wattiau
2015 Requirements Engineering  
The aim of this paper is to fill this gap by looking into drawing a picture of the literature on knowledge and reuse in security requirements engineering.  ...  , and tools related to security knowledge reuse in security requirements engineering.  ...  Mapping studies must be distinguished from systematic literature reviews in several ways.  ... 
doi:10.1007/s00766-015-0220-8 fatcat:5udeoele2vgtlgt32klw3jvo6q

A Systematic Mapping Study on Privacy by Design in Software Engineering

Miguel Ehecatl Morales-Trujillo, Gabriel Alberto García-Mireles, Erick Orlando Matla-Cruz, Mario Piattini
2019 CLEI Electronic Journal  
A systematic mapping study was conducted in order to identify relevant literature that collects PbD principles and goals in software development as well as methods and/or practices that support privacy  ...  Protecting personal data in current software systems is a complex issue that requires legal regulations and constraints to manage personal data as well as a methodological support to develop software systems  ...  In this paper, the term systematic review refers to both a systematic literature review [26] and a systematic mapping study [27] .  ... 
doi:10.19153/cleiej.22.1.4 fatcat:yimqeklypfegbnkqt4ujjmkywy

Ontologies for Privacy Requirements Engineering: A Systematic Literature Review [article]

Mohamad Gharib, Paolo Giorgini, John Mylopoulos
2016 arXiv   pre-print
In this paper, we address this problem with a systematic literature review whose main purpose is to identify the main concepts/relations for capturing privacy requirements.  ...  In addition, the identified concepts/relations are further analyzed to propose a novel privacy ontology to be used by software engineers when dealing with privacy requirements.  ...  While Mellado et al. [172] carried out a systematic review of the existing literature concerning security requirements engineering in order to summarize the current contributions and to provide a road  ... 
arXiv:1611.10097v1 fatcat:s2ibbxujorcrffbrtqdq6ibgze

Privacy Engineering and Quality Assurance [chapter]

Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran
2014 The Privacy Engineer's Manifesto  
Reliability and security issues can result in a failure of the • software to protect Pi, which in turn becomes a privacy issue.  ...  prIVaCY eNGINeerING reQUIreS BOth QUaLItY aND SeCUre CODe (part 1) By James Ransome, Phd, CissP, CisM, senior director, Product security at McAfee Quality and Secure Code Privacy engineering requires  ... 
doi:10.1007/978-1-4302-6356-2_10 fatcat:tw4zvoihpjgqdn3pprsz756y4e

Mobile App Privacy in Software Engineering Research: A Systematic Mapping Study [article]

Fahimeh Ebrahimi, Miroslav Tushev, Anas Mahmoud
2019 arXiv   pre-print
In this survey paper, we conduct a systematic mapping study of 54 Software Engineering (SE) primary studies on mobile app privacy.  ...  Our results show that existing literature can be divided into four main categories: privacy policy, requirements, user perspective, and leak detection.  ...  CONCLUSIONS We conducted a systematic mapping study of Software Engineering literature on mobile apps privacy.  ... 
arXiv:1910.03622v1 fatcat:tbs4ogqqcjhyhdgylmdymttozu

Social Engineering Attacks Prevention: A Systematic Literature Review

Wenni Syafitri, Zarina Shukur, Umi A. Mokhtar, Rossilawati Sulaiman, Muhammad Azwan Ibrahim
2022 IEEE Access  
We conducted a systematic literature review based on Bryman & Bell's literature review method.  ...  We present this systematic literature review to recommend ways to prevent social engineering attacks.  ...  This result was done by appraising sixteen factors to determine social networks' security and privacy [13] .  ... 
doi:10.1109/access.2022.3162594 fatcat:y2t4jlbfprfyzfjdfro5r2wyt4

Towards a Principled Approach for Engineering Privacy by Design [chapter]

Majed Alshammari, Andrew Simpson
2017 Lecture Notes in Computer Science  
In this report, we analyse three privacy requirements engineering methods from which we derived a set of criteria that meet these challenges.  ...  Challenges involved in engineering Privacy by Design include a lack of holistic, systematic and integrative methodologies that address the complexity and variability of privacy, and support the translation  ...  In privacy literature, Hansen et al.  ... 
doi:10.1007/978-3-319-67280-9_9 fatcat:udbt5doysrgnzb7obxrd2rmm3m

ReqPriSec: Security and Privacy aware Web-based Versatile Requirement Engineering Tool

Tejas Shah, S. V.
2019 International Journal of Computer Applications  
The security and privacy requirements have not given much attention in RE.  ...  There is a strong need of versatile and security-privacy aware RE tool to elicit, manage and specify requirement efficiently and in standardized format.  ...  Specification in systematic manner.  ... 
doi:10.5120/ijca2019919071 fatcat:pes2xv6m3zfabobm3a5eqpizfm

Engineering privacy requirements valuable lessons from another realm

Yod-Samuel Martin, Jose M. del Alamo, Juan C. Yelmo
2014 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)  
a solid reference detailing which specific, technical requirements they must abide by, and a systematic methodology to follow.  ...  The Privacy by Design approach to systems engineering introduces privacy requirements in the early stages of development, instead of patching up a built system afterwards.  ...  privacy requirements engineering.  ... 
doi:10.1109/espre.2014.6890523 dblp:conf/re/MartinAY14 fatcat:u74qxcbckzh3vg7lhavrwf7adq
« Previous Showing results 1 — 15 out of 22,355 results