Capturing security requirements for software systems

被引:20
|
作者
El-Hadary, Hassan [1 ]
El-Kassas, Sherif [1 ]
机构
[1] Amer Univ Cairo, Dept Comp Sci & Engn, Cairo, Egypt
关键词
Application security; Security requirements engineering; Security threat modeling; Problem frames;
D O I
10.1016/j.jare.2014.03.001
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. (C) 2014 Production and hosting by Elsevier B.V. on behalf of Cairo University.
引用
收藏
页码:463 / 472
页数:10
相关论文
共 50 条
  • [31] Assessing Security Risk and Requirements for Systems of Systems
    Ki-Aries, Duncan
    2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 454 - 459
  • [32] Capturing user requirements and priorities for innovative interactive systems
    Dearden, A
    Howard, S
    OZCHI 98 - 1998 AUSTRALASIAN COMPUTER HUMAN INTERACTION CONFERENCE, PROCEEDINGS, 1998, : 160 - 167
  • [33] Essential Requirements for Data Security in the Context of Software Metrics
    Sastry, B. R.
    Saradhi, M. V. Vijaya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (01): : 19 - 23
  • [34] Security and design requirements for software-defined VANETs
    Ben Jaballah, Wafa
    Conti, Mauro
    Lal, Chhagan
    COMPUTER NETWORKS, 2020, 169 (169)
  • [35] Security requirements engineering framework for software product lines
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    INFORMATION AND SOFTWARE TECHNOLOGY, 2010, 52 (10) : 1094 - 1117
  • [36] EMPIRICALLY ANALYZING AND EVALUATING SECURITY FEATURES IN SOFTWARE REQUIREMENTS
    Hayrapetian, Allenoush
    Raje, Rajeev
    ISEC'18: PROCEEDINGS OF THE 11TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, 2018,
  • [37] Special checklist for security requirements in software development site
    Hwang, Sun-myung
    MUE: 2007 International Conference on Multimedia and Ubiquitous Engineering, Proceedings, 2007, : 1172 - 1176
  • [38] Security Requirements Management in Software Product Line Engineering
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 250 - +
  • [39] An approach to analyze software security requirements in ABAC model
    Thanh-Nhan Luong
    Dinh-Hieu Vo
    Ninh-Thuan Truong
    PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 184 - 189
  • [40] A Novel Approach for Acquiring Training and Software Security Requirements
    Fujs, Damjan
    Vrhovec, Simon
    Vavpotic, Damjan
    EUROPEAN INTERDISCIPLINARY CYBERSECURITY - EICC 2020, 2020,