Problem-based Elicitation of Security Requirements The ProCOR Method

被引:5
|
作者
Wirtz, Roman [1 ]
Heisel, Maritta [1 ]
Meis, Rene [1 ]
Omerovic, Aida [2 ]
Stolen, Ketil [2 ]
机构
[1] Univ Duisburg Essen, Duisburg, Germany
[2] SINTEF Inst, Oslo, Norway
关键词
Risk Management; Security; Requirements Engineering; Problem-based; Model-based;
D O I
10.5220/0006669400260038
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security is of great importance for many software systems. The security of a software system can be compromised by threats, which may harm assets with a certain likelihood, thus constituting a risk. All such risks should be identified, and unacceptable risks should be reduced, which gives rise to security requirements. The relevant security requirements should be known right from the beginning of the software development process. Eliciting security requirements should be done in a systematic way. We propse a method to elicit security requirements that address unacceptable risks. They require a reduction of the risk to an acceptable level. Our method combines the CORAS risk management method with Jackson's problem-based requirements analysis approach. Based on the functional requirements for a software system, security risks are identified and evaluated. Unacceptable risks give rise to high-level security requirements. To reduce the risk, treatments are selected. Based on the selected treatments, concretized security requirements are set up and represented in a similar way as functional requirements. Thus, both functional and security requirements can then drive the software development process.
引用
收藏
页码:26 / 38
页数:13
相关论文
共 50 条
  • [1] Problem-Based Security Requirements Elicitation and Refinement with PresSuRE
    Fassbender, Stephan
    Heisel, Maritta
    Meis, Rene
    [J]. SOFTWARE TECHNOLOGIES, ICSOFT 2014, 2015, 555 : 311 - 330
  • [2] A Security Ontology for Security Requirements Elicitation
    Souag, Amina
    Salinesi, Camille
    Mazo, Raul
    Comyn-Wattiau, Isabelle
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
  • [3] Security Requirements Elicitation Using Method Weaving and Common Criteria
    Saeki, Motoshi
    Kaiya, Haruhiko
    [J]. MODELS IN SOFTWARE ENGINEERING, 2009, 5421 : 185 - +
  • [4] Security requirements elicitation via weaving scenarios based on security evaluation criteria
    Itoga, Hiroya
    Ohnishi, Atsushi
    [J]. USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 70 - 79
  • [5] Argumentation-Based Security Requirements Elicitation: The Next Round
    Ionita, Dan
    Bullee, Jan-Willem
    Wieringa, Roel J.
    [J]. 2014 IEEE 1ST WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2014, : 7 - 12
  • [6] An Ontology Based Collaborative Recommender System for Security Requirements Elicitation
    Williams, Imano
    [J]. 2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 448 - 453
  • [7] Security analysis of word problem-based cryptosystems
    Levy-dit-Vehel, Francoise
    Perret, Ludovic
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2010, 54 (01) : 29 - 41
  • [8] Security analysis of word problem-based cryptosystems
    Françoise Levy-dit-Vehel
    Ludovic Perret
    [J]. Designs, Codes and Cryptography, 2010, 54 : 29 - 41
  • [9] Presentation and Validation of Method for Security Requirements Elicitation from Business Processes
    Ahmed, Naved
    Matulevicius, Raimundas
    [J]. INFORMATION SYSTEMS ENGINEERING IN COMPLEX ENVIRONMENTS, 2015, 204 : 20 - 35
  • [10] Security Requirements Elicitation and Modeling Authorizations
    Goel, Rajat
    Govil, Mahesh Chandra
    Singh, Girdhari
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 239 - 250