F. Shamsi, Sarah Bamatraf, Talal Rahwan, Z. Aung, D. Svetinovic
{"title":"移动政府转型的系统安全需求分析","authors":"F. Shamsi, Sarah Bamatraf, Talal Rahwan, Z. Aung, D. Svetinovic","doi":"10.1109/ICAT.2017.8171627","DOIUrl":null,"url":null,"abstract":"With the launch of smart government initiatives, it is important to analyze the security requirements that will enable the decision makers to successfully carry out the process of transformation to mobile government (M-Government). This paper presents a security analysis using the security requirements engineering SQUARE method in the context of the M-Government transformation. The mobile application architectures are evaluated as a case study using the SQUARE method. In particular, the main contribution of this paper is the analysis of the outcomes of the SQUARE method using qualitative evaluation criteria.","PeriodicalId":112404,"journal":{"name":"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Systems security requirements analysis for M-Government transformation\",\"authors\":\"F. Shamsi, Sarah Bamatraf, Talal Rahwan, Z. Aung, D. Svetinovic\",\"doi\":\"10.1109/ICAT.2017.8171627\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the launch of smart government initiatives, it is important to analyze the security requirements that will enable the decision makers to successfully carry out the process of transformation to mobile government (M-Government). This paper presents a security analysis using the security requirements engineering SQUARE method in the context of the M-Government transformation. The mobile application architectures are evaluated as a case study using the SQUARE method. In particular, the main contribution of this paper is the analysis of the outcomes of the SQUARE method using qualitative evaluation criteria.\",\"PeriodicalId\":112404,\"journal\":{\"name\":\"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAT.2017.8171627\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAT.2017.8171627","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Systems security requirements analysis for M-Government transformation
With the launch of smart government initiatives, it is important to analyze the security requirements that will enable the decision makers to successfully carry out the process of transformation to mobile government (M-Government). This paper presents a security analysis using the security requirements engineering SQUARE method in the context of the M-Government transformation. The mobile application architectures are evaluated as a case study using the SQUARE method. In particular, the main contribution of this paper is the analysis of the outcomes of the SQUARE method using qualitative evaluation criteria.