{"id":"https://openalex.org/W2781731965","doi":"https://doi.org/10.1007/978-981-10-7796-8_6","title":"A Template for Writing Security Requirements","display_name":"A Template for Writing Security Requirements","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2781731965","doi":"https://doi.org/10.1007/978-981-10-7796-8_6","mag":"2781731965"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-10-7796-8_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-10-7796-8_6","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079215617","display_name":"Massila Kamalrudin","orcid":"https://orcid.org/0000-0003-4804-2042"},"institutions":[{"id":"https://openalex.org/I32589535","display_name":"Technical University of Malaysia Malacca","ror":"https://ror.org/01xb6rs26","country_code":"MY","type":"education","lineage":["https://openalex.org/I32589535"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Massila Kamalrudin","raw_affiliation_strings":["Innovative Software System and Service Group (IS3), Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100, Durian Tunggal, Melaka, Malaysia","Universiti Teknikal Malaysia Melaka, Melaka, Malaysia"],"affiliations":[{"raw_affiliation_string":"Innovative Software System and Service Group (IS3), Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100, Durian Tunggal, Melaka, Malaysia","institution_ids":["https://openalex.org/I32589535"]},{"raw_affiliation_string":"Universiti Teknikal Malaysia Melaka, Melaka, Malaysia","institution_ids":["https://openalex.org/I32589535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029587162","display_name":"Nuridawati Mustafa","orcid":"https://orcid.org/0000-0002-4247-2255"},"institutions":[{"id":"https://openalex.org/I32589535","display_name":"Technical University of Malaysia Malacca","ror":"https://ror.org/01xb6rs26","country_code":"MY","type":"education","lineage":["https://openalex.org/I32589535"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Nuridawati Mustafa","raw_affiliation_strings":["Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100, Durian Tunggal, Melaka, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100, Durian Tunggal, Melaka, Malaysia","institution_ids":["https://openalex.org/I32589535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110506426","display_name":"Safiah Sidek","orcid":null},"institutions":[{"id":"https://openalex.org/I32589535","display_name":"Technical University of Malaysia Malacca","ror":"https://ror.org/01xb6rs26","country_code":"MY","type":"education","lineage":["https://openalex.org/I32589535"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Safiah Sidek","raw_affiliation_strings":["Innovative Software System and Service Group (IS3), Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100, Durian Tunggal, Melaka, Malaysia"],"affiliations":[{"raw_affiliation_string":"Innovative Software System and Service Group (IS3), Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100, Durian Tunggal, Melaka, Malaysia","institution_ids":["https://openalex.org/I32589535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029587162"],"corresponding_institution_ids":["https://openalex.org/I32589535"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.01408181,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"73","last_page":"86"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7459521293640137},{"id":"https://openalex.org/keywords/requirements-analysis","display_name":"Requirements analysis","score":0.6047402024269104},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.524183452129364},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.5001981258392334},{"id":"https://openalex.org/keywords/syntax","display_name":"Syntax","score":0.4889432489871979},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.4795491397380829},{"id":"https://openalex.org/keywords/non-functional-requirement","display_name":"Non-functional requirement","score":0.4554833769798279},{"id":"https://openalex.org/keywords/user-requirements-document","display_name":"User requirements document","score":0.4530167877674103},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.449990451335907},{"id":"https://openalex.org/keywords/sentence","display_name":"Sentence","score":0.4434674382209778},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.4433594048023224},{"id":"https://openalex.org/keywords/functional-requirement","display_name":"Functional requirement","score":0.43028926849365234},{"id":"https://openalex.org/keywords/requirements-management","display_name":"Requirements management","score":0.4114949107170105},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.40350696444511414},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.3700806498527527},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3013458251953125},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.28870224952697754},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2633569836616516},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.25910863280296326},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.21228718757629395},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.20667067170143127},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10384050011634827},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08238860964775085},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.0633380115032196}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7459521293640137},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.6047402024269104},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.524183452129364},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.5001981258392334},{"id":"https://openalex.org/C60048249","wikidata":"https://www.wikidata.org/wiki/Q37437","display_name":"Syntax","level":2,"score":0.4889432489871979},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.4795491397380829},{"id":"https://openalex.org/C199747065","wikidata":"https://www.wikidata.org/wiki/Q3254666","display_name":"Non-functional requirement","level":5,"score":0.4554833769798279},{"id":"https://openalex.org/C143267671","wikidata":"https://www.wikidata.org/wiki/Q7901856","display_name":"User requirements document","level":2,"score":0.4530167877674103},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.449990451335907},{"id":"https://openalex.org/C2777530160","wikidata":"https://www.wikidata.org/wiki/Q41796","display_name":"Sentence","level":2,"score":0.4434674382209778},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.4433594048023224},{"id":"https://openalex.org/C62235348","wikidata":"https://www.wikidata.org/wiki/Q3264234","display_name":"Functional requirement","level":2,"score":0.43028926849365234},{"id":"https://openalex.org/C173577280","wikidata":"https://www.wikidata.org/wiki/Q530038","display_name":"Requirements management","level":4,"score":0.4114949107170105},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.40350696444511414},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3700806498527527},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3013458251953125},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.28870224952697754},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2633569836616516},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.25910863280296326},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.21228718757629395},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.20667067170143127},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10384050011634827},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08238860964775085},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.0633380115032196},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-10-7796-8_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-10-7796-8_6","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1918308797","https://openalex.org/W1981028474","https://openalex.org/W1987380569","https://openalex.org/W1988225931","https://openalex.org/W2013238834","https://openalex.org/W2057864103","https://openalex.org/W2062212465","https://openalex.org/W2074937108","https://openalex.org/W2081944711","https://openalex.org/W2086116693","https://openalex.org/W2106326663","https://openalex.org/W2131730994","https://openalex.org/W2144336896","https://openalex.org/W2157437711","https://openalex.org/W2293554594","https://openalex.org/W2523012251","https://openalex.org/W2547043776","https://openalex.org/W2555574302","https://openalex.org/W2574735744"],"related_works":["https://openalex.org/W757926393","https://openalex.org/W3153864189","https://openalex.org/W2472769502","https://openalex.org/W2406589135","https://openalex.org/W2135031301","https://openalex.org/W2574990557","https://openalex.org/W4245011035","https://openalex.org/W2012957645","https://openalex.org/W4252360077","https://openalex.org/W4224303169"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
