{"created":"2020-11-19T15:38:13.841860+00:00","id":6274,"links":{},"metadata":{"_buckets":{"deposit":"cce608b1-af96-4b4b-84f5-f5d9aac6047f"},"_deposit":{"created_by":45,"id":"6274","owner":"45","owners":[45],"owners_ext":{"displayname":"","email":"dimennyaung@uit.edu.mm","username":""},"pid":{"revision_id":0,"type":"recid","value":"6274"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/6274","sets":["1582963342780:1605779935331"]},"communities":["uit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Defining a Software Engineering Process with Cost-effective Security Requirements Implementation","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Today, security problems involving computers and software are frequent, widespread, and serious. The number and variety of attacks by persons and malicious software from outside organizations, particularly via the Internet, are increasing rapidly, and the amount and consequences of insider attacks remains serious. Security is not just a question of security functionality; the properties desired must be shown to hold wherever required throughout the secure system. Because security properties are systems properties, security is an omnipresent issue throughout the software lifecycle. This paper describes the existing software development lifecycle with the integration of security engineering process. After that, we will adopt the Information System Environment in the case of the University of Information Technology (UIT). Moreover, this paper describes an Information Security Software Engineering (ISSE) process for discovering and addressing users’ information protection needs based on the case study of UIT’s information System Environment. Finally, the proposed system performs the quantitative risk analysis on the study of UIT Information System Environment."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Information Security Software Engineering"},{"interim":"Security Engineering Process"},{"interim":"Quantitative risk analysis"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-11-19"}],"displaytype":"preview","filename":"Defining a Software Engineering Process with Cost-effective Security Requirements Implementation.pdf","filesize":[{"value":"1.4 Mb"}],"format":"application/pdf","license_note":"© 2017 ICAIT","licensetype":"license_note","url":{"url":"https://meral.edu.mm/record/6274/files/Defining a Software Engineering Process with Cost-effective Security Requirements Implementation.pdf"},"version_id":"25497eb2-5f9c-4c88-aa1e-7f10b60d626f"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"ICAIT-2017","subitem_c_date":"1-2 November, 2017","subitem_conference_title":"1st International Conference on Advanced Information Technologies","subitem_place":"Yangon, Myanmar","subitem_session":"Software Engineering and Web Mining","subitem_website":"https://www.uit.edu.mm/icait-2017/"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Swe Zin Hlaing"},{"subitem_authors_fullname":"Koichiro Ochimizu"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2017-11-02"},"item_title":"Defining a Software Engineering Process with Cost-effective Security Requirements Implementation","item_type_id":"21","owner":"45","path":["1605779935331"],"publish_date":"2020-11-19","publish_status":"0","recid":"6274","relation_version_is_last":true,"title":["Defining a Software Engineering Process with Cost-effective Security Requirements Implementation"],"weko_creator_id":"45","weko_shared_id":-1},"updated":"2022-03-24T23:11:28.265788+00:00"}