Explore figures and images from publications
FIGURE 8 - available via license: Creative Commons Attribution 4.0 International
Content may be subject to copyright.
Workshop results of application of proposed method

Workshop results of application of proposed method

Source publication
Full-text available
Forming high quality requirements has a direct impact on project success. Gathering security requirements could be challenging, since it demands a multidisciplinary approach and security expertise. Security requirements repository enables an effective alternative for addressing this challenge. The main objective of this paper is to present the desi...

Context in source publication

Context 1
... results of applying the proposed model to the sample case are shown in Fig. 8. The results are quite promising and show that participants have understood, benefited from, and applied the proposed model effectively for the sample case. The submitted keywords, component lists, and requirement sets for each group in 10 separate files were also examined and scored by the authors in order to determine the ...