References
- S.Yahya, M.Kamalrudin, S.Sidek, "The Use of Essential Use Cases (EUCs) to enhance the Process of Capturing Security Requirements for Accurate Secure Software," e-Proceeding of Software Engineering Postgraduates Workshop (SEPoW), pp.21-26, 2013. http://ftmk.utem.edu.my/sepow2013/e-proceeding_SEPoW2013.pdf. Access from September 2015
- S.Yahya, M.Kamalrudin, S.Sidek, "A Review on Tool Supports for Security Requirements Engineering," Proceedings of the IEEE Conference on Open Systems, Sarawak, Malaysia, 2013. http://dx.doi.org/10.1109/ICOS.2013.6735072
- C. B. Haley, R. C. Laney, J. D. Moffett, and B. Nuseibeh, "Security Requirements Engineering: A Framework for Representation and Analysis," IEEE Trans. Software Eng., pp.133-153, 2008. http://dx.doi.org/10.1109/TSE.2007.70754
- G.Ian, "Essential software architecture," pp.1-283, 2006. http://dx.doi.org/10.1007/978-3-642-19176-3
- K.Ivo, E.George, C. Leslie, G. Leana, M. Nenad, "A comprehensive exploration of challenges in architecturebased reliability estimation," Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)," Vol 202-227, 2009. http://dx.doi.org/10.1007/978-3-642-10248-6_9
- I. Kashmala, "Analytical Survey for Assuring and Maintaining Quality of Mobile Applications," Vol 2, pp. 336-345, 2015. www.ijccse.com/april15/RP_0415_5872.pdf. Access from September 2015.
- N. Nan, "Extractive Product Line Requirement," 2009. http://dx.doi.org/10.1109/RE.2008.49
- N. Ranjbar, M. Abdinejadi, "Authentication and Authorization for Mobile Devices," 2012. http://hdl.handle.net/2077/30043
- "User Authentication in Mobile Access," https://sc1.checkpoint.com/documents/R77/CP_R77_Mobile_Access_WebAdmin/41587.htm, Accessed from September 2015.
- P. Vilhan, L. Hudec, "Building Public Key Infrastructure for MANET with Help of B.A.T.M.A.N. Advanced," Modelling Symposium (EMS), 2013 European, Manchester, 20-22 Nov., pp. 566-571, 2013. http://dx.doi.org/10.1109/EMS.2013.94
- A.Rekha, P.Anitha, A.S.Subaira, C.Vinothini, "A Survey on Encryption Algorithms for Data Security," IJRET: International Journal of Research in Engineering and Technology, pp.131-134. http://dx.doi.org/10.15623/ijret.2014.0312017
- C. E.Loftis, T. X. Chen, J. M Cirella, "Attribute-level encryption of data in public Android databases," (RTI Press publication OP-0016-1309), Research Triangle Park, NC: RTI Press, 2013. http://dx.doi.org/10.3768/rtipress.2013.op.0016.1309
- C.L. Chen , W.C.Tsai, "Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET," Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference, Taichung, pp. 660-665, 3-5 July 2013. http://dx.doi.org/10.1109/IMIS.2013.119
- E. Paja, F.Dalpiaz, M.Poggianella, P.Roberti, P.Giorgini, "STS-tool: Socio-technical Security Requirements through social commitments," Proceedings of the 20th IEEE International Requirements Engineering Conference (RE), IEEE , pp.331-332, 2012. http://dx.doi.org/10.1109/RE.2012.6345830
- M.S.Ware, J.B.Bowles, "Using the Common Criteria to Elicit Security Requirements with Use Cases," Southeast Con, 2006. Proceedings of the IEEE, pp.273-278, March 31 2005-April 2 2005. http://dx.doi.org/10.1109/second.2006.1629363
- P. Aho, N. Menz, and T. Raty, "Enhancing generated Java GUI models with valid test data," Proceedings of the 2011 IEEE Conf. on Open Systems (ICOS), Langkawi, Malaysia, pp. 310-315, 25-28 Sep 2011. http://dx.doi.org/10.1109/ICOS.2011.6079253
- A. Kull, "Automatic GUI Model Generation: State of the Art," Proceedings of the. 2012 IEEE 23rd Int. Symposium on Software Reliability Engineering Workshops (ISSREW), Dallas, TX, USA, pp. 207-212, 27-30 Nov 2012. http://dx.doi.org/10.1109/ISSREW.2012.23
- B.J.Berger, K.Sohr and R.Koschke, "Extracting and Analyzing the Implemented Security Architecture of Business Applications," Proceedings of the 2013 17th European Conference on Software Maintenance and Reengineering, 2013. http://dx.doi.org/10.1109/CSMR.2013.37
- N.Yusop, M.Kamalrudin, S.Sidek, "Security Requirements Validation for Mobile Apps: A Systematic Literature Review," Jurnal Teknologi (Science & Engineering), 2015. http://dx.doi.org/10.11113/jt.v77.7017
- S.Yahya, M.Kamalrudin, S.Safiah, J.Grundy, "Capturing Security Requirements Using Essential Use Cases (EUCs)," Proceedings of the First Asia Pacific Requirements Engineering Symposium, APRES 2014, New Zealand,April 28-29, pp. 16-30, 2014. http://dx.doi.org/10.1007/978-3-662-43610-3_2