International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 13 - Issue 3 |
Published: January 2011 |
Authors: Chandrabose A, Dr Alagarsamy K |
![]() |
Chandrabose A, Dr Alagarsamy K . Security Requirements Engineering – A Strategic Approach. International Journal of Computer Applications. 13, 3 (January 2011), 25-32. DOI=10.5120/1760-2410
@article{ 10.5120/1760-2410, author = { Chandrabose A,Dr Alagarsamy K }, title = { Security Requirements Engineering – A Strategic Approach }, journal = { International Journal of Computer Applications }, year = { 2011 }, volume = { 13 }, number = { 3 }, pages = { 25-32 }, doi = { 10.5120/1760-2410 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2011 %A Chandrabose A %A Dr Alagarsamy K %T Security Requirements Engineering – A Strategic Approach%T %J International Journal of Computer Applications %V 13 %N 3 %P 25-32 %R 10.5120/1760-2410 %I Foundation of Computer Science (FCS), NY, USA
Although security requirements engineering has recently attracted increasing attention, it has lacked a context in which to operate. A number of papers have described how security requirements may be violated, but apart from a few hints in the general literature, none have described satisfactorily what security requirements are.