Home // CLOUD COMPUTING 2017, The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization // View article


Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review

Authors:
Argyri Pattakou
Christos Kalloniatis
Stefanos Gritzalis

Keywords: security; privacy; requirements; engineering methods; traditional architectures; cloud computing

Abstract:
As the software industry experiences a rapid growth in developing information systems, many methodologies, technolo- gies and tools are continuously developing in order to support the system implementation process. However, as security and privacy have been considered important aspects of an information system, many researchers presented methods that, through a number of specific steps, enable system designers to integrate security and privacy requirements at the early stage of system design. Different security and privacy engineering methods have been presented in order to be applied in traditional or cloud architectures. This paper reviews a number of security and privacy requirements engineering methods in both areas and presents a comparative study between these methods.

Pages: 145 to 151

Copyright: Copyright (c) IARIA, 2017

Publication date: February 19, 2017

Published in: conference

ISSN: 2308-4294

ISBN: 978-1-61208-529-6

Location: Athens, Greece

Dates: from February 19, 2017 to February 23, 2017