{"id":"https://openalex.org/W2128892642","doi":"https://doi.org/10.1109/secureware.2007.4385331","title":"Towards a Comprehensive View of Secure Software Engineering","display_name":"Towards a Comprehensive View of Secure Software Engineering","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W2128892642","doi":"https://doi.org/10.1109/secureware.2007.4385331","mag":"2128892642"},"language":"en","primary_location":{"id":"doi:10.1109/secureware.2007.4385331","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secureware.2007.4385331","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079597786","display_name":"Mehrez Essafi","orcid":null},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Mehrez Essafi","raw_affiliation_strings":["National School for Computer Studies, RIADI Laboratory University of Manouba, Tunisia, Tunisia","Univ. of Manouba, Manouba"],"affiliations":[{"raw_affiliation_string":"National School for Computer Studies, RIADI Laboratory University of Manouba, Tunisia, Tunisia","institution_ids":["https://openalex.org/I83259278"]},{"raw_affiliation_string":"Univ. of Manouba, Manouba","institution_ids":["https://openalex.org/I83259278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086901360","display_name":"Lamia Labed","orcid":null},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Lamia Labed","raw_affiliation_strings":["National School for Computer Studies, RIADI Laboratory University of Manouba, Tunisia, Tunisia","Univ. of Manouba, Manouba"],"affiliations":[{"raw_affiliation_string":"National School for Computer Studies, RIADI Laboratory University of Manouba, Tunisia, Tunisia","institution_ids":["https://openalex.org/I83259278"]},{"raw_affiliation_string":"Univ. of Manouba, Manouba","institution_ids":["https://openalex.org/I83259278"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113495421","display_name":"Henda Ben Gh\u00e9zala","orcid":null},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Henda Ben Ghezala","raw_affiliation_strings":["National School for Computer Studies, RIADI Laboratory University of Manouba, Tunisia, Tunisia","Univ. of Manouba, Manouba"],"affiliations":[{"raw_affiliation_string":"National School for Computer Studies, RIADI Laboratory University of Manouba, Tunisia, Tunisia","institution_ids":["https://openalex.org/I83259278"]},{"raw_affiliation_string":"Univ. of Manouba, Manouba","institution_ids":["https://openalex.org/I83259278"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079597786"],"corresponding_institution_ids":["https://openalex.org/I83259278"],"apc_list":null,"apc_paid":null,"fwci":0.6334,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.70305776,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"9","issue":null,"first_page":"181","last_page":"186"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.6829445362091064},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.682364821434021},{"id":"https://openalex.org/keywords/social-software-engineering","display_name":"Social software engineering","score":0.6247484087944031},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5499295592308044},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.5231783986091614},{"id":"https://openalex.org/keywords/extensibility","display_name":"Extensibility","score":0.5164611339569092},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4954303503036499},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.484987735748291},{"id":"https://openalex.org/keywords/software-requirements","display_name":"Software requirements","score":0.47609174251556396},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.4319581091403961},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.421188622713089},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28472650051116943},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.13167759776115417},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10766398906707764}],"concepts":[{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.6829445362091064},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.682364821434021},{"id":"https://openalex.org/C182500959","wikidata":"https://www.wikidata.org/wiki/Q7551380","display_name":"Social software engineering","level":5,"score":0.6247484087944031},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5499295592308044},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.5231783986091614},{"id":"https://openalex.org/C32833848","wikidata":"https://www.wikidata.org/wiki/Q4115054","display_name":"Extensibility","level":2,"score":0.5164611339569092},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4954303503036499},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.484987735748291},{"id":"https://openalex.org/C54534927","wikidata":"https://www.wikidata.org/wiki/Q4462275","display_name":"Software requirements","level":5,"score":0.47609174251556396},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.4319581091403961},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.421188622713089},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28472650051116943},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.13167759776115417},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10766398906707764},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/secureware.2007.4385331","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secureware.2007.4385331","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W118803003","https://openalex.org/W150081733","https://openalex.org/W641490396","https://openalex.org/W1486178352","https://openalex.org/W1524147119","https://openalex.org/W1549220645","https://openalex.org/W1553981755","https://openalex.org/W1559133364","https://openalex.org/W1600219599","https://openalex.org/W1604658196","https://openalex.org/W1973272170","https://openalex.org/W2015004885","https://openalex.org/W2069234241","https://openalex.org/W2087478420","https://openalex.org/W2105062511","https://openalex.org/W2129083809","https://openalex.org/W2132358830","https://openalex.org/W2152497221","https://openalex.org/W2164273722","https://openalex.org/W2164651549","https://openalex.org/W2294407885","https://openalex.org/W3118517595","https://openalex.org/W4205192141","https://openalex.org/W4250418004","https://openalex.org/W6606026359","https://openalex.org/W6629172888","https://openalex.org/W6632729097","https://openalex.org/W6633125429","https://openalex.org/W6636119979","https://openalex.org/W7042623272"],"related_works":["https://openalex.org/W2187336458","https://openalex.org/W4230385779","https://openalex.org/W1811024770","https://openalex.org/W3003273405","https://openalex.org/W2375023814","https://openalex.org/W4312715343","https://openalex.org/W2170778849","https://openalex.org/W2033170485","https://openalex.org/W2186532739","https://openalex.org/W2559524254"],"abstract_inverted_index":{"Secure":[0],"software":[1,56,62,69,87,104,115],"engineering":[2,63,70,105],"is":[3,8,35,45,79],"a":[4,23,60,81],"big":[5],"challenge.":[6],"This":[7,43],"mainly":[9],"due":[10],"to":[11,48,123],"the":[12,102],"increasing":[13],"complexity,":[14],"openness":[15],"and":[16,100,111,116,119],"extensibility":[17],"of":[18,26,51,85],"modern":[19],"applications,":[20],"which":[21,65],"make":[22],"complete":[24],"analysis":[25],"security":[27],"requirements":[28],"very":[29],"hard.":[30],"The":[31],"overall":[32],"problem":[33],"space":[34],"consequently":[36],"no":[37],"longer":[38],"easily":[39],"comprehensible":[40],"for":[41,91],"developers.":[42],"paper":[44],"an":[46],"attempt":[47],"explore":[49],"some":[50],"these":[52],"issues":[53],"underlying":[54],"secure":[55,61,68,86,103,114],"engineering.":[57,88],"We":[58],"propose":[59],"framework,":[64],"suggests":[66],"considering":[67],"along":[71],"four":[72],"different,":[73],"but":[74],"complementary,":[75],"views.":[76],"Each":[77],"view":[78],"capturing":[80],"particular":[82],"relevant":[83],"aspect":[84],"Our":[89],"motivations":[90],"developing":[92],"this":[93],"framework":[94],"are":[95],"to:":[96],"(a)":[97],"help":[98,121],"understand":[99],"clarify":[101],"domain,":[106],"(b)":[107],"guide":[108],"in":[109],"classifying":[110],"comparing":[112],"both":[113],"securing":[117],"approaches":[118],"(c)":[120],"researchers":[122],"identify":[124],"new":[125],"research":[126],"axes.":[127]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
