A Systematic Review and Analytical Evaluation of Security Requirements Engineering Approaches

被引:0
|
作者
Malik Nadeem Anwar Mohammad
Mohammed Nazir
Khurram Mustafa
机构
[1] Jamia Millia Islamia University,Department of Computer Science
关键词
Requirements engineering; Security requirements; Security requirements engineering (SRE); SRE approaches; Software security; Systematic review;
D O I
暂无
中图分类号
学科分类号
摘要
Security is an inevitable concern in today’s scenario of software-based application’s pervasiveness and development practices. Researchers and practitioners frequently advocate that security-related aspects should be integrated and incorporated right from the beginning of SDLC. Security requirements engineering (SRE) plays an important role during the inceptive phases of software development. Thereby, we conducted a systematic review of the current state of the literature related to SRE. In total, we selected and analyzed 108 relevant studies. After analyzing the selected studies, we identified 20 different SRE approaches and compared them on different technical parameters like ‘performance in the requirements subphase,’ ‘usability with respect to size and complexity of the project,’ ‘notation used,’ ‘industry recognition/adoption,’ ‘tool support,’ ‘standards integration’ and ‘elicitation technique used.’ The results of this study are based on the comparative analysis of the SRE approaches, their analytical evaluation by the authors and trends observed during the course of the review. The major findings of this study indicate that SRE approaches like ‘Misuse case, Secure Tropos, SEPP and SQUARE’ are most popular among researchers while UML-based approaches like ‘Misuse Case, SecureUML and UMLsec’ are easily adaptable approaches. Threat modeling as an activity is adapted by most of the SRE approaches while few approaches support risk analysis. In addition, among several other findings, our study indicates that most of the SRE approaches fail to integrate security standards and formal methods. The contribution of this work is consequently that of supplying researchers with a summarized comparison of existing SRE approaches, along with the best practices adopted in the field of security requirements engineering. The insights provided here on selection appropriateness may prove to be instrumental for research in the area and may significantly facilitate both researchers and practitioners.
引用
收藏
页码:8963 / 8987
页数:24
相关论文
共 50 条
  • [1] A Systematic Review and Analytical Evaluation of Security Requirements Engineering Approaches
    Mohammad, Malik Nadeem Anwar
    Nazir, Mohammed
    Mustafa, Khurram
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2019, 44 (11) : 8963 - 8987
  • [2] A systematic review of security requirements engineering
    Mellado, Daniel
    Blanco, Carlos
    Sanchez, Luis E.
    Fernandez-Medina, Eduardo
    COMPUTER STANDARDS & INTERFACES, 2010, 32 (04) : 153 - 165
  • [3] Requirements Elicitation Approaches: A Systematic Review
    Franco, Aldrin Jaramillo
    2015 IEEE 9TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2015, : 520 - 521
  • [4] Gamification in Requirements Engineering: a Systematic Review
    Cursino, Rodrigo
    Ferreira, Daniel
    Lencastre, Maria
    Fagundes, Roberta
    Pimentel, Joao
    2018 11TH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (QUATIC), 2018, : 119 - 125
  • [5] Experimental Evaluation of Security Requirements Engineering Benefits
    Boutahar, Jaouad
    Maskani, Ilham
    El Ghazi El Houssaini, Souhail
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 411 - 415
  • [6] A Review on Tool Supports for Security Requirements Engineering
    Yahya, Syazwani
    Kamalrudin, Massila
    Sidek, Safiah
    2013 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS), 2013, : 190 - +
  • [7] A Systematic Mapping Study on Security in Agile Requirements Engineering
    Villamizar, Hugo
    Kalinowski, Marcos
    Viana, Marx
    Fernandez, Daniel Mendez
    44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 454 - 461
  • [9] A Systematic Classification of Requirements Engineering Approaches for Adaptive Systems
    Ghannem, Adnane
    Hamdi, Mohamed Salah
    Ammar, Hany H.
    Soui, Makram
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [10] Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
    Ali, Yasir
    Khan, Habib Ullah
    Khalid, Muhammad
    JOURNAL OF BIG DATA, 2023, 10 (01)