Secure and Usable Requirements Engineering

被引:4
|
作者
Romero-Mariona, Jose [1 ]
机构
[1] Univ Calif Irvine, Donald Bren Sch Informat & Comp Sci, Irvine, CA 92717 USA
关键词
security; requirements; usability; specifications;
D O I
10.1109/ASE.2009.81
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software security is an increasingly important aspect of computing; however, it is still addressed as an after thought in too many development efforts. While a variety of approaches have been proposed for security requirements engineering, we find many still lacking with respect to their usability. In this proposal I describe my work in the area of security requirements engineering. SURE, Secure and Usable Requirements Engineering, is a new approach that supports non-security experts in order to specify security requirements from which testing artifacts can be derived. In addition, ASSURE, Automated Support for Secure and Usable Requirements Engineering, a system that implements the SURE technique is presented.
引用
收藏
页码:703 / 706
页数:4
相关论文
共 50 条
  • [1] Usable and Secure Requirements Engineering with CAIRIS
    Faily, Shamal
    Ki-Aries, Duncan
    [J]. 2019 27TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2019), 2019, : 502 - 503
  • [2] Making mobile requirements engineering tools usable and useful
    Maiden, Neil
    Seyff, Norbert
    Gruenbacher, Paul
    Otojare, Omo
    Mitteregger, Karl
    [J]. RE'06: 14TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 29 - +
  • [3] Secure or usable?
    Cranor, LF
    Garfinkel, S
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (05) : 16 - 18
  • [4] A maturity model for secure requirements engineering
    Niazi, Mahmood
    Saeed, Ashraf Mohammed
    Alshayeb, Mohammad
    Mahmood, Sajjad
    Zafar, Saad
    [J]. COMPUTERS & SECURITY, 2020, 95
  • [5] Security Requirements Engineering for Secure Business Processes
    Paja, Elda
    Giorgini, Paolo
    Paul, Stephane
    Meland, Per Hakon
    [J]. WORKSHOPS ON BUSINESS INFORMATICS RESEARCH, 2012, 106 : 77 - +
  • [6] Engineering secure software by modelling privacy and security requirements
    Kreeger, MN
    Duncan, I
    [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 37 - 40
  • [7] Lightening in a Bottle: Usable and Secure
    Crowe, David
    Al-Hamdani, Wasim A.
    [J]. PROCEEDINGS OF THE 2012 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE (INFOSEC CD '12), 2012, : 62 - 68
  • [8] Usable, Secure, Private Search
    Raykova, Mariana
    Cui, Ang
    Binh Vo
    Liu, Bin
    Malkin, Tal
    Bellovin, Steven M.
    Stolfo, Salvatore J.
    [J]. IEEE SECURITY & PRIVACY, 2012, 10 (05) : 53 - 60
  • [9] Secure Tropos framework for software product lines requirements engineering
    Mellado, Daniel
    Mouratidis, Haralambos
    Fernandez-Medina, Eduardo
    [J]. COMPUTER STANDARDS & INTERFACES, 2014, 36 (04) : 711 - 722
  • [10] TIM: Secure and usable authentication for smartphones
    Yang, Gi-Chul
    Hu, Qinwen
    Asghar, Muhammad Rizwan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 71