Conflicts between security and privacy measures in software requirements engineering

6Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The digital world is expanding rapidly into all parts of the physical world and our environment is shaped by the technologies we use. Majority of these technologies are user-generated content through browsing, emails, blogging, social media, e-shopping, video sharing and many other activities. our research considers how technology and software architecture in particular could be designed to pave the way for greater security and privacy in digital proceedings and services. The research treat security and privacy as an intrinsic component of a system design. The proposed framework in this research cover a broad approach by examining security and privacy from the requirements phase under a unified framework which enables to richly bridge the gap between requirement and implementation stages.

Cite

CITATION STYLE

APA

Ganji, D., Mouratidis, H., Gheytassi, S. M., & Petridis, M. (2015). Conflicts between security and privacy measures in software requirements engineering. In Communications in Computer and Information Science (Vol. 534, pp. 323–334). Springer Verlag. https://doi.org/10.1007/978-3-319-23276-8_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free