Privacy, Security, Soft Requirements, and Flaky Tests

被引:0
|
作者
Staron, Miroslaw [1 ,2 ]
Abrahao, Silvia [3 ]
Honnenahalli, Chetan [4 ]
Horkoff, Jennifer [1 ,2 ]
机构
[1] Chalmers Univ Technol, Comp Sci & Engn Dept, Interact Design & Software Engn Div, S-41296 Gothenburg, Sweden
[2] Univ Gothenburg, S-41296 Gothenburg, Sweden
[3] Univ Politecn Valencia, Valencia 46022, Spain
[4] Meta, Menlo Pk, CA 94025 USA
关键词
Software testing; Privacy; Software quality; Security; Requirements engineering;
D O I
10.1109/MS.2023.3283848
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This edition of the "Practitioners' Digest" covers a set of papers on novel approaches and tools for dealing with privacy, security, soft requirements, and flaky tests in modern software development from the 30th IEEE International Conference on Requirements Engineering (RE 2022), the 29th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2023), and the 16th IEEE International Conference on Software Testing, Verification, and Validation (ICST 2023). Feedback or suggestions are welcome. In addition, if you try or adopt any of the practices included in the column, please send us and the authors of the paper(s) a note about your experiences.
引用
收藏
页码:117 / 120
页数:4
相关论文
共 50 条
  • [1] Security and privacy requirements in interactive TV
    Dhiah el Diehn I. Abou-Tair
    Ingo Köster
    Kathrin Höfke
    [J]. Multimedia Systems, 2011, 17 : 393 - 408
  • [2] Visualising privacy and security for requirements engineering
    Kreeger, MN
    Duncan, I
    [J]. SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
  • [3] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    [J]. INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
  • [4] Security and privacy requirements in interactive TV
    Abou-Tair, Dhiah el Diehn I.
    Koester, Ingo
    Hoefke, Kathrin
    [J]. MULTIMEDIA SYSTEMS, 2011, 17 (05) : 393 - 408
  • [5] The hidden meta-requirements of security and privacy
    Spafford, G
    [J]. FIFTH IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2001, : 10 - 10
  • [6] Requirements for Security, Privacy, and Trust in the Internet of Things
    Mohammed, Sabah
    Kim, Tai-Hoon
    Fang, Wai Chi
    [J]. IEEE SECURITY & PRIVACY, 2021, 19 (01) : 8 - 10
  • [7] Security and Privacy in Video Surveillance: Requirements and Challenges
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 169 - 184
  • [8] DOES COMPUTER SECURITY MEET PRIVACY REQUIREMENTS
    ELLISON, R
    [J]. INFORMATION PRIVACY, 1978, 1 (01): : 33 - 37
  • [9] Security and Privacy Requirements for the Internet of Things: A Survey
    Alhirabi, Nada
    Rana, Omer
    Perera, Charith
    [J]. ACM TRANSACTIONS ON INTERNET OF THINGS, 2021, 2 (01):
  • [10] Analyzing regulatory rules for privacy and security requirements
    Breaux, Travis D.
    Anton, Annie I.
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) : 5 - 20