Capturing security requirements for software systems

被引:20
|
作者
El-Hadary, Hassan [1 ]
El-Kassas, Sherif [1 ]
机构
[1] Amer Univ Cairo, Dept Comp Sci & Engn, Cairo, Egypt
关键词
Application security; Security requirements engineering; Security threat modeling; Problem frames;
D O I
10.1016/j.jare.2014.03.001
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. (C) 2014 Production and hosting by Elsevier B.V. on behalf of Cairo University.
引用
收藏
页码:463 / 472
页数:10
相关论文
共 50 条
  • [2] Quantifying Satisfaction of Security Requirements of Cloud Software Systems
    Nhlabatsi, Armstrong
    Khan, Khaled M. D.
    Hong, Jin B.
    Kim, Dong Seong
    Fernandez, Rachael
    Fetais, Noora
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 426 - 444
  • [3] Engineering safety and security related requirements for software intensive systems
    Firesmith, Donald G.
    29th International Conference on Software Engineering: ICSE 2007 Companion Volume, Proceedings, 2007, : 169 - 169
  • [4] Security requirements for software development
    Kim, TH
    Shin, MC
    Kim, SH
    Cha, JS
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 116 - 122
  • [5] Security requirements engineering for software systems: Case studies in support of software engineering education
    Mead, Nancy R.
    Hough, Eric D.
    19TH CONFERENCE ON SOFTWARE ENGINEERING EDUCATION & TRAINING, PROCEEDINGS, 2006, : 149 - +
  • [6] Mapping Security Requirements of Mobile Health Systems into Software Development Lifecycle
    Al-Taee, Majid A.
    Al-Nuaimy, Waleed
    Muhsin, Zahra J.
    Al-Ataby, Ali
    Al-Taee, Ahmad M.
    2016 9TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2016), 2016, : 87 - 93
  • [7] Capturing software requirements modeling from ontology tree
    Liu, Yaqing
    Guo, Jinghuan
    Liu, Yong
    International Journal of u- and e- Service, Science and Technology, 2015, 8 (11) : 1 - 10
  • [8] Capturing consumer preferences as requirements for software product lines
    Jelena Zdravkovic
    Eric-Oluf Svee
    Constantinos Giannoulis
    Requirements Engineering, 2015, 20 : 71 - 90
  • [9] Capturing consumer preferences as requirements for software product lines
    Zdravkovic, Jelena
    Svee, Eric-Oluf
    Giannoulis, Constantinos
    REQUIREMENTS ENGINEERING, 2015, 20 (01) : 71 - 90
  • [10] Identifying requirements for network security software
    White, DA
    Alijani, GS
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 539 - 543