Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology

被引:4
|
作者
Diamantopoulou, Vasiliki [1 ,2 ]
Mouratidis, Haralambos [1 ]
机构
[1] Univ Brighton, Sch Comp Engn & Math, Ctr Secure Usable & Intelligent Syst CSIUS, Brighton, E Sussex, England
[2] Univ Aegean, Sch Sci, Dept Informat & Commun Syst Engn, Chios, Greece
关键词
Evaluation; Information security modelling; Computer privacy; Security requirements engineering; Privacy requirements engineering; Physics of notation;
D O I
10.1108/ICS-12-2017-0087
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose The purpose of this study is the analysis of a security and privacy requirements engineering methodology. Such methodologies are considered an important part of systems' development process when they contain and process a large amount of critical information, and thus need to remain secure and ensure privacy. Design/methodology/approach These methodologies provide techniques, methods and norms for tackling security and privacy issues in information systems. In this process, the utilisation of effective, clear and understandable modelling languages with sufficient notation is of utmost importance, as the produced models are used not only among IT experts or among security specialists but also for communication among various stakeholders, in business environments or among novices in an academic environment. Findings The qualitative analysis revealed a partial satisfaction of these principles. Originality/value This paper evaluates the effectiveness of a security and privacy requirements engineering methodology, namely, Secure Tropos, on the nine principles of the theory of notation.
引用
收藏
页码:382 / 400
页数:19
相关论文
共 50 条
  • [1] Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation
    Diamantopoulou, Vasiliki
    Pavlidis, Michalis
    Mouratidis, Haralambos
    [J]. COMPUTER SECURITY, 2017, 2018, 10683 : 210 - 225
  • [2] How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
    Compagna, Luca
    El Khoury, Paul
    Krausova, Alzbeta
    Massacci, Fabio
    Zannone, Nicola
    [J]. ARTIFICIAL INTELLIGENCE AND LAW, 2009, 17 (01) : 1 - 30
  • [3] Visualising privacy and security for requirements engineering
    Kreeger, MN
    Duncan, I
    [J]. SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
  • [4] Applying a security requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 192 - 206
  • [5] Towards a Common Security and Privacy Requirements Elicitation Methodology
    Makri, Eleni-Laskarina
    Lambrinoudakis, Costas
    [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159
  • [6] Engineering secure software by modelling privacy and security requirements
    Kreeger, MN
    Duncan, I
    [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 37 - 40
  • [7] Requirements Engineering for Security, Privacy and Services in Cloud Environments
    Stefanos Gritzalis
    Lin Liu
    [J]. Requirements Engineering, 2013, 18 : 297 - 298
  • [8] Requirements Engineering for Security, Privacy and Services in Cloud Environments
    Gritzalis, Stefanos
    Liu, Lin
    [J]. REQUIREMENTS ENGINEERING, 2013, 18 (04) : 297 - 298
  • [9] Which Security Requirements Engineering Methodology Should I Choose? Towards a Requirements Engineering-based Evaluation Approach
    Bulusu, Sravani Teja
    Laborde, Romain
    Wazan, Ahmad Samer
    Barrere, Francois
    Benzekri, Abdelmalek
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [10] STORE: Security Threat Oriented Requirements Engineering Methodology
    Ansari, Md Tarique Jamal
    Pandey, Dhirendra
    Alenezi, Mamdouh
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (02) : 191 - 203