Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/7847
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Haoues, Mariem | - |
dc.contributor.author | Sellami, Asma | - |
dc.contributor.author | Ben-Abdallah, Hanene | - |
dc.contributor.author | Demirörs, Onur | - |
dc.date.accessioned | 2020-07-18T03:35:16Z | - |
dc.date.available | 2020-07-18T03:35:16Z | - |
dc.date.issued | 2019 | - |
dc.identifier.isbn | 9781728132853 | - |
dc.identifier.uri | https://doi.org/10.1109/SEAA.2019.00049 | - |
dc.identifier.uri | https://hdl.handle.net/11147/7847 | - |
dc.description | 45th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2019 -- 28 August 2019 through 30 August 2019 | en_US |
dc.description.abstract | Software project scope defines functional and non-functional requirements. These requirements may change to satisfy the customers' needs. However, the control of scope creep represents one of the success keys in software project management. Changes in non-functional requirements affect the ISO/IEC 25010 quality characteristics such as security, portability, etc. Furthermore, some of these quality characteristics may evolve throughout the software life cycle into functional requirements. In this paper, we explore the use of COSMIC method-ISO/IEC 19761 to quantify and evaluate security change requests. Measuring the functional size of security change requests allows stakeholders to make appropriate decisions about whether to accept, defer, or deny the change. © 2019 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
dc.relation.ispartof | 45th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2019 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | COSMIC method ISO/IEC 19761 | en_US |
dc.subject | Functional Size Measurement | en_US |
dc.subject | Non-functional requirements | en_US |
dc.subject | Security systems | en_US |
dc.subject | System requirements | en_US |
dc.subject | Technical change | en_US |
dc.title | Evaluating software security change requests: A COSMIC-based quantification approach | en_US |
dc.type | Conference Object | en_US |
dc.institutionauthor | Demirörs, Onur | - |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.identifier.startpage | 268 | en_US |
dc.identifier.endpage | 275 | en_US |
dc.identifier.wos | WOS:000555692900042 | en_US |
dc.identifier.scopus | 2-s2.0-85075989462 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1109/SEAA.2019.00049 | - |
dc.relation.doi | 10.1109/SEAA.2019.00049 | en_US |
dc.coverage.doi | 10.1109/SEAA.2019.00049 | en_US |
local.message.claim | 2022-06-07T10:38:19.943+0300 | * |
local.message.claim | |rp00032 | * |
local.message.claim | |submit_approve | * |
local.message.claim | |dc_contributor_author | * |
local.message.claim | |None | * |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | N/A | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | open | - |
item.openairetype | Conference Object | - |
item.fulltext | With Fulltext | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
Evaluating_Software.pdf | 743.51 kB | Adobe PDF | View/Open |
CORE Recommender
SCOPUSTM
Citations
3
checked on Oct 25, 2024
WEB OF SCIENCETM
Citations
1
checked on Oct 26, 2024
Page view(s)
178
checked on Oct 28, 2024
Download(s)
144
checked on Oct 28, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.