Effective Systems Security Requirements in Product Line Engineering

被引:0
|
作者
Adejokun, Ademola [1 ]
Siok, Michael F. [2 ]
机构
[1] Lockheed Martin Aeronautics, Fort Worth,TX, United States
[2] Computer Science and Engineering Department at the University of Texas, Arlington,TX, United States
关键词
Cryptography - Product design;
D O I
10.1002/inst.12306
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Requirements engineering for complex software-intensive systems (and other systems) requires identifying, specifying, analyzing, and reviewing system requirements early in the system development process. However, many cases overlook system security requirements, treating them as an afterthought during this important initial process stage. Missing security requirements for these system types cannot guarantee system integrity. It is not cost efficient to retrofit requirements at later stages to include missing security capabilities specified earlier in-process. Detailed analysis and understanding of security requirements enable building confidentiality and integrity into our systems. Thus, early process activities must include security requirements engineering. Product Line Engineering development must guarantee system integrity and assurance for a family of systems borne from a common design. Hence, detailed requirements elicitation and specification is important early in the product-line development and must include security requirements. Further, security requirements must revisit applicability, extension, and new security requirements specified to provide for security coverage of selected features contained within the product line's instances. This paper describes an approach to security requirements engineering identification and includes introducing a security profile to facilitate developing and evolving a secure product line for software-intensive systems. © 2020 by Ademola Adejokun and Michael F. Siok. Published and used by INCOSE with permission.
引用
收藏
页码:26 / 30
相关论文
共 50 条
  • [1] Security Requirements Management in Software Product Line Engineering
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 250 - +
  • [2] Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering
    Mellado, Daniel
    Rodriguez, Jesus
    Fernandez-Medina, Eduardo
    Piattini, Mario
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 224 - +
  • [3] Requirements engineering in software product line engineering
    Insfran, Emilio
    Chastek, Gary
    Donohoe, Patrick
    Sampaio do Prado Leite, Julio Cesar
    REQUIREMENTS ENGINEERING, 2014, 19 (04) : 331 - 332
  • [4] Requirements engineering in software product line engineering
    Emilio Insfran
    Gary Chastek
    Patrick Donohoe
    Julio César Sampaio do Prado Leite
    Requirements Engineering, 2014, 19 : 331 - 332
  • [5] An Effective Security Requirements Engineering Framework for Cyber-Physical Systems
    Rehman, Shafiq Ur
    Gruhn, Volker
    TECHNOLOGIES, 2018, 6 (03):
  • [6] Introduction to product line requirements engineering
    Berenbach, Brian
    SPLC 2006: 10th International Software Product Line Conference, Proceedings, 2006, : 215 - 215
  • [7] An introduction to global product line requirements engineering
    Berenbach, Brian
    Second IEEE International Conference on Global Software Engineering, Proceedings, 2007, : 300 - 301
  • [8] Security requirements engineering framework for software product lines
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    INFORMATION AND SOFTWARE TECHNOLOGY, 2010, 52 (10) : 1094 - 1117
  • [9] Towards security requirements management for software product lines:: A security domain requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) : 361 - 371
  • [10] Electronic voting systems security requirements engineering
    Daimi, K
    Wilson, C
    SERP '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2005, : 230 - 235