Enhancing security requirements engineering by organizational learning

被引:0
|
作者
Kurt Schneider
Eric Knauss
Siv Houmb
Shareeful Islam
Jan Jürjens
机构
[1] Leibniz Universität Hannover,Software Engineering Group
[2] Secure-NOK AS,School of Computing, IT and Engineering
[3] University of East London,Chair for Software Engineering
[4] TU Dortmund and Fraunhofer ISST,undefined
来源
Requirements Engineering | 2012年 / 17卷
关键词
Secure software engineering; Requirements analysis; Organizational learning; Requirements workflow modeling;
D O I
暂无
中图分类号
学科分类号
摘要
More and more software projects today are security-related in one way or the other. Requirements engineers without expertise in security are at risk of overlooking security requirements, which often leads to security vulnerabilities that can later be exploited in practice. Identifying security-relevant requirements is labor-intensive and error-prone. In order to facilitate the security requirements elicitation process, we present an approach supporting organizational learning on security requirements by establishing company-wide experience resources and a socio-technical network to benefit from them. The approach is based on modeling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-relevant requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organizational levels. As a basis for our approach, we introduce heuristic assistant tools. They support reuse of existing experiences that are relevant for security. In particular, they include Bayesian classifiers that issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain-specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.
引用
收藏
页码:35 / 56
页数:21
相关论文
共 50 条
  • [1] Enhancing security requirements engineering by organizational learning
    Schneider, Kurt
    Knauss, Eric
    Houmb, Siv
    Islam, Shareeful
    Juerjens, Jan
    [J]. REQUIREMENTS ENGINEERING, 2012, 17 (01) : 35 - 56
  • [2] A Gamified Tutorial for Learning about Security Requirements Engineering
    Alami, Daniel
    Dalpiaz, Fabiano
    [J]. 2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2017, : 418 - 423
  • [3] Requirements engineering for organizational transformation
    Ramos, I
    Berry, DM
    Carvalho, JA
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2005, 47 (07) : 479 - 495
  • [4] Security and trust requirements engineering
    Giorgini, P
    Massacci, F
    Zannone, N
    [J]. FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 237 - 272
  • [5] Systems requirements for organizational learning
    Chen, JQ
    Lee, TE
    Zhang, RD
    Zhang, YJ
    [J]. COMMUNICATIONS OF THE ACM, 2003, 46 (12) : 73 - 78
  • [6] Organizational Barriers to the Implementation of Security Engineering
    Cline, Bryan S.
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 527 - 531
  • [7] Applying a security requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 192 - 206
  • [8] A comparison of security requirements engineering methods
    Fabian, Benjamin
    Guerses, Seda
    Heisel, Maritta
    Santen, Thomas
    Schmidt, Holger
    [J]. REQUIREMENTS ENGINEERING, 2010, 15 (01) : 7 - 40
  • [9] Survey and analysis on Security Requirements Engineering
    Salini, P.
    Kanmani, S.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (06) : 1785 - 1797
  • [10] Position on Metrics for Security in Requirements Engineering
    Kundi, Mahwish
    Chitchyan, Ruzanna
    [J]. 2014 IEEE 1ST INTERNATIONAL WORKSHOP ON REQUIREMENTS ENGINEERING AND TESTING (RET), 2014, : 29 - 31