Position on Metrics for Security in Requirements Engineering

被引:0
|
作者
Kundi, Mahwish [1 ]
Chitchyan, Ruzanna [1 ]
机构
[1] Univ Leicester, Dept Comp Sci, Leicester, Leics, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A number of well-established software quality metrics are in use in code testing. It is our position that for many code-testing metrics for security equivalent requirements level metrics should be defined. Such requirements-level security metrics should be used in evaluating the quality of software security early on, in order to ensure that the resultant software system possesses the required security characteristics and quality.
引用
收藏
页码:29 / 31
页数:3
相关论文
共 50 条
  • [1] METRICS FOR REQUIREMENTS ENGINEERING
    COSTELLO, RJ
    LIU, DB
    JOURNAL OF SYSTEMS AND SOFTWARE, 1995, 29 (01) : 39 - 63
  • [2] DEVELOPMENT OF SECURITY METRICS Based on Decomposition of Security Requirements and Ontologies
    Savola, Reijo M.
    ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, 2009, : 171 - 174
  • [3] Security and trust requirements engineering
    Giorgini, P
    Massacci, F
    Zannone, N
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 237 - 272
  • [4] Survey and analysis on Security Requirements Engineering
    Salini, P.
    Kanmani, S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (06) : 1785 - 1797
  • [5] Applying a security requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 192 - 206
  • [6] A comparison of security requirements engineering methods
    Fabian, Benjamin
    Guerses, Seda
    Heisel, Maritta
    Santen, Thomas
    Schmidt, Holger
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 7 - 40
  • [7] A pattern system for security requirements engineering
    Hatebur, Denis
    Heisel, Maritta
    Schmidt, Holger
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 356 - +
  • [8] Visualising privacy and security for requirements engineering
    Kreeger, MN
    Duncan, I
    SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
  • [9] A Readiness Model for Security Requirements Engineering
    Mufti, Yusuf
    Niazi, Mahmood
    Alshayeb, Mohammad
    Mahmood, Sajjad
    IEEE ACCESS, 2018, 6 : 28611 - 28631
  • [10] A comparison of security requirements engineering methods
    Benjamin Fabian
    Seda Gürses
    Maritta Heisel
    Thomas Santen
    Holger Schmidt
    Requirements Engineering, 2010, 15 : 7 - 40