Cargando…

Capturing security requirements for software systems

Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement en...

Descripción completa

Detalles Bibliográficos
Autores principales: El-Hadary, Hassan, El-Kassas, Sherif
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4294748/
https://www.ncbi.nlm.nih.gov/pubmed/25685514
http://dx.doi.org/10.1016/j.jare.2014.03.001
_version_ 1782352762180206592
author El-Hadary, Hassan
El-Kassas, Sherif
author_facet El-Hadary, Hassan
El-Kassas, Sherif
author_sort El-Hadary, Hassan
collection PubMed
description Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.
format Online
Article
Text
id pubmed-4294748
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Elsevier
record_format MEDLINE/PubMed
spelling pubmed-42947482015-02-14 Capturing security requirements for software systems El-Hadary, Hassan El-Kassas, Sherif J Adv Res Original Article Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. Elsevier 2014-07 2014-03-12 /pmc/articles/PMC4294748/ /pubmed/25685514 http://dx.doi.org/10.1016/j.jare.2014.03.001 Text en © 2014 Production and hosting by Elsevier B.V. http://creativecommons.org/licenses/by-nc-nd/3.0/ This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/3.0/).
spellingShingle Original Article
El-Hadary, Hassan
El-Kassas, Sherif
Capturing security requirements for software systems
title Capturing security requirements for software systems
title_full Capturing security requirements for software systems
title_fullStr Capturing security requirements for software systems
title_full_unstemmed Capturing security requirements for software systems
title_short Capturing security requirements for software systems
title_sort capturing security requirements for software systems
topic Original Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4294748/
https://www.ncbi.nlm.nih.gov/pubmed/25685514
http://dx.doi.org/10.1016/j.jare.2014.03.001
work_keys_str_mv AT elhadaryhassan capturingsecurityrequirementsforsoftwaresystems
AT elkassassherif capturingsecurityrequirementsforsoftwaresystems