{"id":"https://openalex.org/W4387064060","doi":"https://doi.org/10.1109/icsecs58457.2023.10256374","title":"Security Requirements Assurance: An Assurance Case Perspective","display_name":"Security Requirements Assurance: An Assurance Case Perspective","publication_year":2023,"publication_date":"2023-08-25","ids":{"openalex":"https://openalex.org/W4387064060","doi":"https://doi.org/10.1109/icsecs58457.2023.10256374"},"language":"en","primary_location":{"id":"doi:10.1109/icsecs58457.2023.10256374","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icsecs58457.2023.10256374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051943616","display_name":"Aftab Alam Janisar","orcid":"https://orcid.org/0000-0002-9710-4345"},"institutions":[{"id":"https://openalex.org/I203899302","display_name":"Universiti Teknologi Petronas","ror":"https://ror.org/048g2sh07","country_code":"MY","type":"education","lineage":["https://openalex.org/I203899302"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Aftab Alam Janisar","raw_affiliation_strings":["Universiti Teknologi Petronas,Department of computer and information science,Seri Iskandar Perak,Malaysia,32610"],"affiliations":[{"raw_affiliation_string":"Universiti Teknologi Petronas,Department of computer and information science,Seri Iskandar Perak,Malaysia,32610","institution_ids":["https://openalex.org/I203899302"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058766838","display_name":"Khairul Shafee Kalid","orcid":"https://orcid.org/0000-0001-8383-2395"},"institutions":[{"id":"https://openalex.org/I203899302","display_name":"Universiti Teknologi Petronas","ror":"https://ror.org/048g2sh07","country_code":"MY","type":"education","lineage":["https://openalex.org/I203899302"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Khairul Shafee bin Kalid","raw_affiliation_strings":["Universiti Teknologi Petronas,Department of computer and information science,Seri Iskandar Perak,Malaysia,32610"],"affiliations":[{"raw_affiliation_string":"Universiti Teknologi Petronas,Department of computer and information science,Seri Iskandar Perak,Malaysia,32610","institution_ids":["https://openalex.org/I203899302"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019616714","display_name":"Aliza Sarlan","orcid":"https://orcid.org/0000-0002-6342-9993"},"institutions":[{"id":"https://openalex.org/I203899302","display_name":"Universiti Teknologi Petronas","ror":"https://ror.org/048g2sh07","country_code":"MY","type":"education","lineage":["https://openalex.org/I203899302"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Aliza Bt Sarlan","raw_affiliation_strings":["Universiti Teknologi Petronas,Department of computer and information science,Seri Iskandar Perak,Malaysia,32610"],"affiliations":[{"raw_affiliation_string":"Universiti Teknologi Petronas,Department of computer and information science,Seri Iskandar Perak,Malaysia,32610","institution_ids":["https://openalex.org/I203899302"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056101465","display_name":"Abdul Rehman Gilal","orcid":"https://orcid.org/0000-0002-1904-1588"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Abdul Rehman Gilal","raw_affiliation_strings":["School of Computing, University of Portsmouth,UK","School of Computing, University of Portsmouth, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Portsmouth,UK","institution_ids":["https://openalex.org/I63072094"]},{"raw_affiliation_string":"School of Computing, University of Portsmouth, UK","institution_ids":["https://openalex.org/I63072094"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5051943616"],"corresponding_institution_ids":["https://openalex.org/I203899302"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16520478,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"99","issue":null,"first_page":"78","last_page":"83"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6519266366958618},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.6489360332489014},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.6352736949920654},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.6189403533935547},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.5857608318328857},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5763100385665894},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49756601452827454},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.4924369752407074},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.49072253704071045},{"id":"https://openalex.org/keywords/requirements-analysis","display_name":"Requirements analysis","score":0.48870137333869934},{"id":"https://openalex.org/keywords/requirements-engineering","display_name":"Requirements engineering","score":0.459094375371933},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4524584412574768},{"id":"https://openalex.org/keywords/security-convergence","display_name":"Security convergence","score":0.4246969521045685},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3955082893371582},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.29186689853668213},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.20613673329353333},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.18373003602027893},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.12457737326622009},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.07870569825172424}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6519266366958618},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.6489360332489014},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.6352736949920654},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.6189403533935547},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.5857608318328857},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5763100385665894},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49756601452827454},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.4924369752407074},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.49072253704071045},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.48870137333869934},{"id":"https://openalex.org/C6604083","wikidata":"https://www.wikidata.org/wiki/Q376937","display_name":"Requirements engineering","level":3,"score":0.459094375371933},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4524584412574768},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.4246969521045685},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3955082893371582},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.29186689853668213},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.20613673329353333},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.18373003602027893},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12457737326622009},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.07870569825172424},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsecs58457.2023.10256374","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icsecs58457.2023.10256374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W2606280771","https://openalex.org/W2742200672","https://openalex.org/W2750840762","https://openalex.org/W2781731965","https://openalex.org/W2789520420","https://openalex.org/W2806436836","https://openalex.org/W2884218922","https://openalex.org/W2886168462","https://openalex.org/W2891164157","https://openalex.org/W2904558120","https://openalex.org/W2908851163","https://openalex.org/W2909705103","https://openalex.org/W2921897907","https://openalex.org/W2930458324","https://openalex.org/W2965480889","https://openalex.org/W2967976042","https://openalex.org/W2973063031","https://openalex.org/W2986458967","https://openalex.org/W2996931066","https://openalex.org/W3005152130","https://openalex.org/W3013611019","https://openalex.org/W3022374091","https://openalex.org/W3023452601","https://openalex.org/W3044628965","https://openalex.org/W3090755713","https://openalex.org/W3100455563","https://openalex.org/W3129161282","https://openalex.org/W3133521759","https://openalex.org/W3170375891","https://openalex.org/W3170805470","https://openalex.org/W3197944870","https://openalex.org/W3198758593","https://openalex.org/W3203841480","https://openalex.org/W4200131578","https://openalex.org/W4220840599","https://openalex.org/W4224303169","https://openalex.org/W4229032576","https://openalex.org/W4240226086","https://openalex.org/W4244254990","https://openalex.org/W4251443246","https://openalex.org/W4254919265","https://openalex.org/W4285669161","https://openalex.org/W4291002143","https://openalex.org/W4293052844","https://openalex.org/W4312762438","https://openalex.org/W4320919492","https://openalex.org/W6753208417"],"related_works":["https://openalex.org/W1190389589","https://openalex.org/W110733897","https://openalex.org/W2299494954","https://openalex.org/W2552271940","https://openalex.org/W2758682319","https://openalex.org/W2101814335","https://openalex.org/W88610236","https://openalex.org/W2395987867","https://openalex.org/W2176465394","https://openalex.org/W2418642600"],"abstract_inverted_index":{"In":[0],"the":[1,28,33,84,94,112,118,137,161,167,173,183],"current":[2,72],"era,":[3],"software":[4,19,53],"security":[5,38,45,56,61,69,92,119,126,150,168,174,184,205,208,213],"requirements":[6,46,62,81,127,151,175,185,209],"domain":[7],"has":[8,12],"changed":[9],"thoroughly,":[10],"and":[11,23,35,50,55,77,100,103,114,134,154,189,211],"been":[13],"considered":[14],"an":[15,41],"essential":[16],"aspect":[17],"for":[18,82,147],"quality.":[20],"Machine":[21],"learning":[22],"artificial":[24],"intelligence":[25],"have":[26],"become":[27],"emerging":[29],"trends":[30],"to":[31,98,116,122,129,165,171],"automate":[32],"identification":[34,148,210],"specification":[36],"of":[37,60,86,139,149,160],"requirements.":[39],"As":[40],"active":[42],"research":[43],"area,":[44],"specifications":[47],"are":[48,79,186],"recognized":[49],"persuaded":[51],"in":[52,68,71],"engineering":[54],"assurance":[57,140,157,177],"communities.":[58],"Overfitting":[59],"after":[63],"system":[64,73,95],"design":[65],"can":[66],"result":[67],"issues":[70],"architecture.":[74,88],"Consistency,":[75],"completeness,":[76],"correctness":[78],"critical":[80],"ensuring":[83],"effectiveness":[85],"systems":[87],"However,":[89],"without":[90],"these":[91],"requirements,":[93],"is":[96,106,145],"vulnerable":[97],"attacks":[99],"organization's":[101],"assets,":[102],"its":[104],"reputation":[105],"at":[107],"risk.":[108],"Moreover,":[109],"it":[110],"increases":[111],"cost":[113],"time":[115],"fix":[117],"problem.":[120],"Therefore,":[121],"avoid":[123],"such":[124],"problems":[125],"need":[128],"be":[130],"identified":[131],"more":[132],"precisely":[133],"consistently.":[135],"Realizing":[136],"benefits":[138],"case,":[141],"A":[142],"conceptual":[143,163,193],"framework":[144,164,194],"proposed":[146,162,192],"correctness,":[152],"consistency":[153],"completeness":[155],"using":[156,176],"case.":[158],"Objective":[159],"assist":[166],"requirement":[169,180,214],"engineer":[170],"identify":[172],"case":[178],"during":[179],"phase":[181],"i.e.,":[182],"correct,":[187],"complete,":[188],"consistent.":[190],"The":[191],"involves":[195],"five":[196],"phases:":[197],"(1)":[198],"assets":[199],"identification,":[200,203],"(2)":[201],"threat":[202],"(3)":[204],"objectives,":[206],"(4)":[207],"(5)":[212],"assessment.":[215]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
