On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software

被引:0
|
作者
Umair, Muhammad [1 ]
Khan, Ahmed [1 ]
Zulkernine, Mohammed [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON K7L 3N6, Canada
关键词
Software security; secure software development process; software security requirements engineering;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To avoid security vulnerabilities, there are many secure software development efforts in the directions of secure software development life cycle processes, security specification languages, and security requirements engineering processes. In this paper, we compare and contrast various secure software development processes based on a number of characteristics that such processes should have. We also analyze security specification languages with respect to desirable properties of such languages. Furthermore, we identify activities that should be performed in a security requirements engineering process to derive comprehensive security requirements. We compare different security requirements engineering processes based on these activities. Our analysis shows that many of the secure software requirements engineering methods lack some of the desired properties. The comparative study presented in this paper will provide guidelines to software developers for selecting specific methods that will fulfill their needs in building secure software applications.
引用
收藏
页码:1026 / 1031
页数:6
相关论文
共 50 条
  • [1] Secure software engineering processes
    Essafi, Mehrez
    Ben Ghezala, Henda
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, PROCEEDINGS, 2005, : 295 - 298
  • [2] Selecting the appropriate numerical software for a chemical engineering course
    Shacham, M
    Cutlip, MB
    [J]. COMPUTERS & CHEMICAL ENGINEERING, 1999, 23 : S645 - S648
  • [3] A Requirements Engineering Techniques Review in Agile Software Development Methods
    Zamudio, Lizbeth
    Alfonso Aguilar, Jose
    Tripp, Carolina
    Misra, Sanjay
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2017, PT V, 2017, 10408 : 683 - 698
  • [4] Security Requirements Engineering for Secure Business Processes
    Paja, Elda
    Giorgini, Paolo
    Paul, Stephane
    Meland, Per Hakon
    [J]. WORKSHOPS ON BUSINESS INFORMATICS RESEARCH, 2012, 106 : 77 - +
  • [5] Engineering secure software by modelling privacy and security requirements
    Kreeger, MN
    Duncan, I
    [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 37 - 40
  • [6] VIEWPOINT ORIENTED SOFTWARE-DEVELOPMENT - METHODS AND VIEWPOINTS IN REQUIREMENTS ENGINEERING
    FINKELSTEIN, A
    GOEDICKE, M
    KRAMER, J
    NISKIER, C
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 490 : 29 - 54
  • [7] Requirements engineering and agile software development
    Paetsch, F
    Eberlein, A
    Maurer, F
    [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 308 - 313
  • [8] Secure Tropos framework for software product lines requirements engineering
    Mellado, Daniel
    Mouratidis, Haralambos
    Fernandez-Medina, Eduardo
    [J]. COMPUTER STANDARDS & INTERFACES, 2014, 36 (04) : 711 - 722
  • [9] Adaption of a Secure Software Development Methodology for Secure Engineering Design
    Von Solms, Sune
    Futcher, Lynn A.
    [J]. IEEE ACCESS, 2020, 8 : 125630 - 125637
  • [10] Secure software engineering in devops and agile development
    Jaatun, Martin Gilje
    Cruzes, Daniela Soares
    [J]. CEUR Workshop Proceedings, 2017, 1977