Analysis of Security Requirements Engineering: Towards a Comprehensive Approach

被引:0
|
作者
Maskani, Ilham [1 ]
Boutahar, Jaouad [2 ]
El Ghazi El Houssaini, Souhail [2 ]
机构
[1] Hassan II Univ, ENSEM, LISER Lab, Casablanca, Morocco
[2] EHTP, Syst Architectures & Networks Team, Casablanca, Morocco
关键词
Security requirements; Requirements engineering; Security standards; Comparison; Risk assessment;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Software's security depends greatly on how a system was designed, so it's very important to capture security requirements at the requirements engineering phase. Previous research proposes different approaches, but each is looking at the same problem from a different perspective such as the user, the threat, or the goal perspective. This creates huge gaps between them in terms of the used terminology and the steps followed to obtain security requirements. This research aims to define an approach as comprehensive as possible, incorporating the strengths and best practices found in existing approaches, and filling the gaps between them. To achieve that, relevant literature reviews were studied and primary approaches were compared to find their common and divergent traits. To guarantee comprehensiveness, a documented comparison process was followed. The outline of our approach was derived from this comparison. As a result, it reconciles different perspectives to security requirements engineering by including: the identification of stakeholders, assets and goals, and tracing them later to the elicited requirements, performing risk assessment in conformity with standards and performing requirements validation. It also includes the use of modeling artifacts to describe threats, risks or requirements, and defines a common terminology.
引用
收藏
页码:38 / 45
页数:8
相关论文
共 50 条
  • [1] Towards comprehensive requirement analysis for data warehouses:: Considering security requirements
    Soler, Emilio
    Stefanov, Veronika
    Mazon, Jose-Norberto
    Trujillo, Juan
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 104 - +
  • [2] Which Security Requirements Engineering Methodology Should I Choose? Towards a Requirements Engineering-based Evaluation Approach
    Bulusu, Sravani Teja
    Laborde, Romain
    Wazan, Ahmad Samer
    Barrere, Francois
    Benzekri, Abdelmalek
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [3] Survey and analysis on Security Requirements Engineering
    Salini, P.
    Kanmani, S.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (06) : 1785 - 1797
  • [4] Towards security requirements management for software product lines:: A security domain requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) : 361 - 371
  • [5] An MBSE-based approach for the analysis of requirements towards engineering IT architectures
    Heihoff-Schwede, Joerg
    Kaiser, Lydia
    Dumitrescu, Roman
    [J]. 2019 5TH IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (IEEE ISSE 2019), 2019,
  • [6] Adopting a situational requirements engineering approach for the analysis of civil aviation security standards
    Laleau, Régine
    Vignes, Sylvie
    Ledru, Yves
    Lemoine, Michel
    Bert, Didier
    Donzeau-Gouge, Véronique
    Dubois, Catherine
    Peureux, Fabien
    [J]. Software Process Improvement and Practice, 2006, 11 (05): : 487 - 503
  • [7] An approach to security requirements engineering for a high assurance system
    Irvine C.E.
    Levin T.
    Wilson J.D.
    Shifflett D.
    Pereira B.
    [J]. Requirements Engineering, 2002, 7 (4) : 192 - 206
  • [8] Security requirements engineering: A framework for representation and analysis
    Haley, Charles B.
    Laney, Robin
    Moffett, Jonathan D.
    Nuseibeh, Bashar
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) : 133 - 153
  • [9] A classification approach for software requirements towards maintainable security
    Kadebu, Prudence
    Sikka, Sunil
    Tyagi, Rajesh Kumar
    Chiurunge, Panashe
    [J]. SCIENTIFIC AFRICAN, 2023, 19