Reusable knowledge in security requirements engineering: a systematic mapping study

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Systematic Mapping Study on Requirements Engineering in Software Ecosystems

Software ecosystems (SECOs) and open innovation processes have been claimed as a way forward for the software industry. A proper understanding of requirements is as important for these IT-systems as for more traditional ones. This paper presents a mapping study on the issues of requirements engineering and quality aspects in SECOs and analyzes emerging ideas. Our findings indicate that among th...

متن کامل

A systematic review of security requirements engineering

a r t i c l e i n f o One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased manner, that is, none of them perform a systematic review of security requirements engineering, and there is not, there...

متن کامل

Specifying Reusable Security Requirements

Unlike typical functional requirements, security requirements can potentially be highly reusable, especially if specified as instances of reusable templates. In this column, I will discuss the concepts underlying security engineering including its quality subfactors. I will then address the issue of security requirements and how they differ from the architectural mechanisms that will fulfill th...

متن کامل

Using Common Criteria as Reusable Knowledge in Security Requirements Elicitation

The elicitation of security requirements (SRs) is a crucial issue to develop secure information systems of high quality. Although we have several methods mainly for functional requirements such as goal-oriented methods and use case modeling, most of them do not provide sufficient supports to identify threats, security objectives and security functions. Security functions are closely related to ...

متن کامل

Improved Security Requirements Engineering using Knowledge Representation

We introduce in this paper a security meta-model for our SysML-Sec framework, developed to improve the security requirements engineering process through the explicit representation of security concerns with knowledge representation techniques. This meta-model enables the specification of ontological concepts which define the semantics of the security artifacts introduced through SysML-Sec diagr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Requirements Engineering

سال: 2015

ISSN: 0947-3602,1432-010X

DOI: 10.1007/s00766-015-0220-8