Enhancing security requirements engineering by organizational learning

被引:0
|
作者
Kurt Schneider
Eric Knauss
Siv Houmb
Shareeful Islam
Jan Jürjens
机构
[1] Leibniz Universität Hannover,Software Engineering Group
[2] Secure-NOK AS,School of Computing, IT and Engineering
[3] University of East London,Chair for Software Engineering
[4] TU Dortmund and Fraunhofer ISST,undefined
来源
Requirements Engineering | 2012年 / 17卷
关键词
Secure software engineering; Requirements analysis; Organizational learning; Requirements workflow modeling;
D O I
暂无
中图分类号
学科分类号
摘要
More and more software projects today are security-related in one way or the other. Requirements engineers without expertise in security are at risk of overlooking security requirements, which often leads to security vulnerabilities that can later be exploited in practice. Identifying security-relevant requirements is labor-intensive and error-prone. In order to facilitate the security requirements elicitation process, we present an approach supporting organizational learning on security requirements by establishing company-wide experience resources and a socio-technical network to benefit from them. The approach is based on modeling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-relevant requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organizational levels. As a basis for our approach, we introduce heuristic assistant tools. They support reuse of existing experiences that are relevant for security. In particular, they include Bayesian classifiers that issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain-specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.
引用
收藏
页码:35 / 56
页数:21
相关论文
共 50 条
  • [21] Electronic voting systems security requirements engineering
    Daimi, K
    Wilson, C
    SERP '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2005, : 230 - 235
  • [22] Experimental Evaluation of Security Requirements Engineering Benefits
    Boutahar, Jaouad
    Maskani, Ilham
    El Ghazi El Houssaini, Souhail
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 411 - 415
  • [23] Framework for Engineering Complex Security Requirements Patterns
    Mazo, Raul
    Feltus, Christophe
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 250 - 254
  • [24] Security requirements engineering: A framework for representation and analysis
    Haley, Charles B.
    Laney, Robin
    Moffett, Jonathan D.
    Nuseibeh, Bashar
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) : 133 - 153
  • [25] A Review on Tool Supports for Security Requirements Engineering
    Yahya, Syazwani
    Kamalrudin, Massila
    Sidek, Safiah
    2013 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS), 2013, : 190 - +
  • [26] Security Requirements Engineering From TARA to PenTest
    Ebert, Christof
    2019 27TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2019), 2019, : 500 - 501
  • [27] Security Requirements Engineering for Secure Business Processes
    Paja, Elda
    Giorgini, Paolo
    Paul, Stephane
    Meland, Per Hakon
    WORKSHOPS ON BUSINESS INFORMATICS RESEARCH, 2012, 106 : 77 - +
  • [28] Guest Editorial: Requirements Engineering for Information Security
    Annie I. Antón
    Requirements Engineering, 2002, 7 (4) : 177 - 178
  • [29] Software Security Requirements Engineering: State of the Art
    Ramachandran, Muthu
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 313 - 322
  • [30] Security Requirements Engineering Process for Web Applications
    Salini, P.
    Kanmani, S.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 2799 - 2807