Enhancing security requirements engineering by organizational learning

被引:0
|
作者
Kurt Schneider
Eric Knauss
Siv Houmb
Shareeful Islam
Jan Jürjens
机构
[1] Leibniz Universität Hannover,Software Engineering Group
[2] Secure-NOK AS,School of Computing, IT and Engineering
[3] University of East London,Chair for Software Engineering
[4] TU Dortmund and Fraunhofer ISST,undefined
来源
Requirements Engineering | 2012年 / 17卷
关键词
Secure software engineering; Requirements analysis; Organizational learning; Requirements workflow modeling;
D O I
暂无
中图分类号
学科分类号
摘要
More and more software projects today are security-related in one way or the other. Requirements engineers without expertise in security are at risk of overlooking security requirements, which often leads to security vulnerabilities that can later be exploited in practice. Identifying security-relevant requirements is labor-intensive and error-prone. In order to facilitate the security requirements elicitation process, we present an approach supporting organizational learning on security requirements by establishing company-wide experience resources and a socio-technical network to benefit from them. The approach is based on modeling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-relevant requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organizational levels. As a basis for our approach, we introduce heuristic assistant tools. They support reuse of existing experiences that are relevant for security. In particular, they include Bayesian classifiers that issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain-specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.
引用
收藏
页码:35 / 56
页数:21
相关论文
共 50 条
  • [41] Enhancing Knowledge Management via Organizational Learning
    Pei, Ng Sin
    CREATING GLOBAL ECONOMIES THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: THEORY & PRACTICE, VOLS 1-3, 2009, : 591 - 595
  • [42] Requirements Engineering in Machine Learning Projects
    Gjorgjevikj, Ana
    Mishev, Kostadin
    Antovski, Ljupcho
    Trajanov, Dimitar
    IEEE ACCESS, 2023, 11 : 72186 - 72208
  • [43] Enhancing individual and organizational learning - A sociological model
    Casey, A
    MANAGEMENT LEARNING, 2005, 36 (02) : 131 - 147
  • [44] Identifying Hidden Needs by Enhancing Organizational Learning
    Kaiser, Alexander
    Kragulj, Florian
    Grisold, Thomas
    Walser, Roman
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON INTELLECTUAL CAPITAL KNOWLEDGE MANAGEMENT & ORGANISATIONAL LEARNING (ICICKM 2015), 2015, : 117 - 124
  • [45] Security Guidelines: Requirements Engineering for Verifying Code Quality
    Zhioua, Zeineb
    Roudier, Yves
    Short, Stuart
    Ameur, Rabea Boulifa
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2016, : 80 - 85
  • [46] STORE: Security Threat Oriented Requirements Engineering Methodology
    Ansari, Md Tarique Jamal
    Pandey, Dhirendra
    Alenezi, Mamdouh
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (02) : 191 - 203
  • [47] BPMN extension evaluation for security requirements engineering framework
    Zareen, Saima
    Anwar, Syed Muhammad
    REQUIREMENTS ENGINEERING, 2024, 29 (02) : 261 - 278
  • [48] An Ontology Based Information Security Requirements Engineering Framework
    Chikh, Azeddine
    Abulaish, Muhammad
    Nabi, Syed Irfan
    Alghathbar, Khaled
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 139 - +
  • [49] An approach to security requirements engineering for a high assurance system
    Irvine C.E.
    Levin T.
    Wilson J.D.
    Shifflett D.
    Pereira B.
    Requirements Engineering, 2002, 7 (4) : 192 - 206
  • [50] A Systematic Mapping Study on Security in Agile Requirements Engineering
    Villamizar, Hugo
    Kalinowski, Marcos
    Viana, Marx
    Fernandez, Daniel Mendez
    44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 454 - 461