Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation

被引:0
|
作者
Diamantopoulou, Vasiliki [1 ]
Pavlidis, Michalis [1 ]
Mouratidis, Haralambos [1 ]
机构
[1] Univ Brighton, Sch Comp Engn & Math, Brighton, E Sussex, England
来源
COMPUTER SECURITY, 2017 | 2018年 / 10683卷
关键词
Security requirements engineering; Privacy requirements engineering; Physics of Notation; Evaluation; FRAMEWORK; DIAGRAM; MODELS; WORDS;
D O I
10.1007/978-3-319-72817-9_14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security and Privacy Requirements Methodologies are considered an important part of the development process of systems, especially for the ones that contain and process a large amount of critical information and inevitably needs to remain secure and thus, ensuring privacy. These methodologies provide techniques, methods, and norms for tackling security and privacy issues in Information Systems. In this process, the utilisation of effective, clear and understandable modelling languages with sufficient notation is of utmost importance, since the produced models are used not only among IT experts or among security specialists, but also for communication among various stakeholders, in business environments or among novices in an academic environment. This paper evaluates the effectiveness of a Security and Privacy Requirements Engineering methodology, namely Secure Tropos on the nine principles of the Theory of Notation. Our qualitative analysis revealed a partial satisfaction of these principles.
引用
收藏
页码:210 / 225
页数:16
相关论文
共 50 条
  • [1] Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology
    Diamantopoulou, Vasiliki
    Mouratidis, Haralambos
    [J]. INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 382 - 400
  • [2] Towards a Common Security and Privacy Requirements Elicitation Methodology
    Makri, Eleni-Laskarina
    Lambrinoudakis, Costas
    [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159
  • [3] How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
    Compagna, Luca
    El Khoury, Paul
    Krausova, Alzbeta
    Massacci, Fabio
    Zannone, Nicola
    [J]. ARTIFICIAL INTELLIGENCE AND LAW, 2009, 17 (01) : 1 - 30
  • [4] Mapping 'Security Safeguard' Requirements in a Data Privacy legislation to an International Privacy Framework: A Compliance Methodology
    Govender, I.
    [J]. 2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [5] Security and privacy requirements in interactive TV
    Dhiah el Diehn I. Abou-Tair
    Ingo Köster
    Kathrin Höfke
    [J]. Multimedia Systems, 2011, 17 : 393 - 408
  • [6] Visualising privacy and security for requirements engineering
    Kreeger, MN
    Duncan, I
    [J]. SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
  • [7] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    [J]. INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
  • [8] Security and privacy requirements in interactive TV
    Abou-Tair, Dhiah el Diehn I.
    Koester, Ingo
    Hoefke, Kathrin
    [J]. MULTIMEDIA SYSTEMS, 2011, 17 (05) : 393 - 408
  • [9] A Security, Privacy and Trust Methodology for IIoT
    Chen, Lifeng
    Ye, Zhixiao
    Jin, Shanyue
    [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2021, 28 (03): : 898 - 906
  • [10] An Intelligent approach for UAV and Drone Privacy Security Using Blockchain Methodology
    Rana, Tarun
    Shankar, Achyut
    Sultan, Mohd Kamran
    Patan, Rizwan
    Balusamy, Balamurugan
    [J]. 2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), 2019, : 162 - 167