Position on Metrics for Security in Requirements Engineering

被引:0
|
作者
Kundi, Mahwish [1 ]
Chitchyan, Ruzanna [1 ]
机构
[1] Univ Leicester, Dept Comp Sci, Leicester, Leics, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A number of well-established software quality metrics are in use in code testing. It is our position that for many code-testing metrics for security equivalent requirements level metrics should be defined. Such requirements-level security metrics should be used in evaluating the quality of software security early on, in order to ensure that the resultant software system possesses the required security characteristics and quality.
引用
收藏
页码:29 / 31
页数:3
相关论文
共 50 条
  • [31] STORE: Security Threat Oriented Requirements Engineering Methodology
    Ansari, Md Tarique Jamal
    Pandey, Dhirendra
    Alenezi, Mamdouh
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (02) : 191 - 203
  • [32] Security Guidelines: Requirements Engineering for Verifying Code Quality
    Zhioua, Zeineb
    Roudier, Yves
    Short, Stuart
    Ameur, Rabea Boulifa
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2016, : 80 - 85
  • [33] BPMN extension evaluation for security requirements engineering framework
    Zareen, Saima
    Anwar, Syed Muhammad
    REQUIREMENTS ENGINEERING, 2024, 29 (02) : 261 - 278
  • [34] A Systematic Mapping Study on Security in Agile Requirements Engineering
    Villamizar, Hugo
    Kalinowski, Marcos
    Viana, Marx
    Fernandez, Daniel Mendez
    44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 454 - 461
  • [35] An approach to security requirements engineering for a high assurance system
    Irvine C.E.
    Levin T.
    Wilson J.D.
    Shifflett D.
    Pereira B.
    Requirements Engineering, 2002, 7 (4) : 192 - 206
  • [36] An Ontology Based Information Security Requirements Engineering Framework
    Chikh, Azeddine
    Abulaish, Muhammad
    Nabi, Syed Irfan
    Alghathbar, Khaled
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 139 - +
  • [37] Security & Safety by Model-based Requirements Engineering
    Japs, Sergej
    2020 28TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE'20), 2020, : 422 - 427
  • [38] A Serious Game for Eliciting Social Engineering Security Requirements
    Beckers, Kristian
    Pape, Sebastian
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 16 - 25
  • [39] Security Requirements Engineering in the Wild: A Survey of Common Practices
    Elahi, Golnaz
    Yu, Eric
    Li, Tong
    Liu, Lin
    2011 35TH IEEE ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2011, : 314 - 319
  • [40] Analysis of Security Requirements Engineering: Towards a Comprehensive Approach
    Maskani, Ilham
    Boutahar, Jaouad
    El Ghazi El Houssaini, Souhail
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (11) : 38 - 45