A Systematic Review and Analytical Evaluation of Security Requirements Engineering Approaches

被引:0
|
作者
Malik Nadeem Anwar Mohammad
Mohammed Nazir
Khurram Mustafa
机构
[1] Jamia Millia Islamia University,Department of Computer Science
关键词
Requirements engineering; Security requirements; Security requirements engineering (SRE); SRE approaches; Software security; Systematic review;
D O I
暂无
中图分类号
学科分类号
摘要
Security is an inevitable concern in today’s scenario of software-based application’s pervasiveness and development practices. Researchers and practitioners frequently advocate that security-related aspects should be integrated and incorporated right from the beginning of SDLC. Security requirements engineering (SRE) plays an important role during the inceptive phases of software development. Thereby, we conducted a systematic review of the current state of the literature related to SRE. In total, we selected and analyzed 108 relevant studies. After analyzing the selected studies, we identified 20 different SRE approaches and compared them on different technical parameters like ‘performance in the requirements subphase,’ ‘usability with respect to size and complexity of the project,’ ‘notation used,’ ‘industry recognition/adoption,’ ‘tool support,’ ‘standards integration’ and ‘elicitation technique used.’ The results of this study are based on the comparative analysis of the SRE approaches, their analytical evaluation by the authors and trends observed during the course of the review. The major findings of this study indicate that SRE approaches like ‘Misuse case, Secure Tropos, SEPP and SQUARE’ are most popular among researchers while UML-based approaches like ‘Misuse Case, SecureUML and UMLsec’ are easily adaptable approaches. Threat modeling as an activity is adapted by most of the SRE approaches while few approaches support risk analysis. In addition, among several other findings, our study indicates that most of the SRE approaches fail to integrate security standards and formal methods. The contribution of this work is consequently that of supplying researchers with a summarized comparison of existing SRE approaches, along with the best practices adopted in the field of security requirements engineering. The insights provided here on selection appropriateness may prove to be instrumental for research in the area and may significantly facilitate both researchers and practitioners.
引用
收藏
页码:8963 / 8987
页数:24
相关论文
共 50 条
  • [31] Requirements Engineering for Autonomous Vehicles: A Systematic Literature Review
    Ribeiro, Quelita A. D. S.
    Ribeiro, Moniky
    Castro, Jaelson
    37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 1299 - 1308
  • [32] Applications of ontologies in requirements engineering: a systematic review of the literature
    Dermeval, Diego
    Vilela, Jessyka
    Bittencourt, Ig Ibert
    Castro, Jaelson
    Isotani, Seiji
    Brito, Patrick
    Silva, Alan
    REQUIREMENTS ENGINEERING, 2016, 21 (04) : 405 - 437
  • [33] Challenges in Requirements Engineering and Its Solutions: A Systematic Review
    Mello, Otavio da Cruz
    Fontoura, Lisandra Manzoni
    ICEIS: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2022, : 70 - 77
  • [34] A SYSTEMATIC REVIEW OF THE LITERATURE ON THE TEACHING AND LEARNING OF REQUIREMENTS ENGINEERING
    Pereira, Mariana
    Mendoza, Vanessa
    Assis, Denise
    Farias, Adelito
    Fagundes, Roberta
    Lencastre, Maria
    9TH INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES (EDULEARN17), 2017, : 1340 - 1349
  • [35] Goal Oriented Approaches in Data Warehouse Requirements Engineering: A Review
    Gosain, Anjana
    Bhati, Rakhi
    SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 244 - 253
  • [36] OpenFog Security Requirements and Approaches
    Martin, Bridget A.
    Michaud, Frank
    Banks, Don
    Mosenia, Arsalan
    Zolfonoon, Riaz
    Irwan, Susanto
    Schrecker, Sven
    Zao, John K.
    2017 IEEE FOG WORLD CONGRESS (FWC), 2017, : 61 - 66
  • [37] A systematic review on Deep Learning approaches for IoT security
    Aversano, Lerina
    Bernardi, Mario Luca
    Cimitile, Marta
    Pecori, Riccardo
    COMPUTER SCIENCE REVIEW, 2021, 40
  • [38] A systematic review on Deep Learning approaches for IoT security
    Aversano, Lerina
    Bernardi, Mario Luca
    Cimitile, Marta
    Pecori, Riccardo
    Computer Science Review, 2021, 40
  • [39] SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
    Yusop, Noorrezam
    Kamalrudin, Massila
    Sidek, Safiah
    JURNAL TEKNOLOGI, 2015, 77 (33): : 123 - 137
  • [40] Security and trust requirements engineering
    Giorgini, P
    Massacci, F
    Zannone, N
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 237 - 272