Explore figures and images from publications
Forming high quality requirements has a direct impact on project success. Gathering security requirements could be challenging, since it demands a multidisciplinary approach and security expertise. Security requirements repository enables an effective alternative for addressing this challenge. The main objective of this paper is to present the desi...
Context in source publication
... results of applying the proposed model to the sample case are shown in Fig. 8. The results are quite promising and show that participants have understood, benefited from, and applied the proposed model effectively for the sample case. The submitted keywords, component lists, and requirement sets for each group in 10 separate files were also examined and scored by the authors in order to determine the ...