Research on Security Requirements Engineering: Problems and Prospects

نویسندگان

  • Arpita Banerjee
  • Megha Sharma
  • C. Banerjee
  • Santosh K Pandey
چکیده

Due to constant pressure on software development team for development of workable software at a fast pace, the focus of the development team has always been on the functional requirements. As such, the identification and implementation of nonfunctional requirements, especially, security which otherwise is considered as a time consuming and quality providing process has always been neglected. But as per the available statistics, security has played a vital role in the success and failure of software systems. The nonfunctional requirement not only introduces characteristics like quality, they also present constraints under which the system must operate. This process maximizes the success of the software system. As per the recent trend, software security is gaining attention from the industries, experts and research communities. The aim of development of secure software is that it attempts to mitigate risks from assets so that the business goals could be achieved. Measuring security of software is still in its infancy and the properties and metrics for measuring security needs to be properly defined. Further, methods need to be made comprehensive for accurate and complete measurement of security properties of software. This research paper reviews the existing work done in the field of security requirements engineering. In addition, it identifies the future research work which could be carried out for betterment of security incorporation in the software development process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rethinking Security Requirements in RE Research Technical Report

As information security became an increasing concern for software developers and users, requirements engineering (RE) researchers brought new insight to security requirements. Security requirements aim to address security at the early stages of system design while accommodating the complex needs of different stakeholders. Meanwhile, other research communities, such as usable privacy and securit...

متن کامل

Security Patterns: Comparing Modeling Approaches

Addressing the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security patterns. Security patterns provide encapsulated solutions to specific security problems and can be used to build secure systems by designers with little knowledge of securi...

متن کامل

Security and Trust Requirements Engineering

Integrating security concerns throughout the whole software development process is one of today’s challenges in software and requirements engineering research. A challenge that so far has proved difficult to meet. The major difficulty is that providing security does not only require to solve technical problems but also to reason on the organization as a whole. This makes the usage of traditiona...

متن کامل

Internet Banking Law: An Iranian Perspective Problems and Prospects of Introducing Islamic Microfinance in Azerbaijan Republic

Bank supervision and monetary policy are strategic concepts in the economy of countries. Development of electronic communications, especially in online and international spheres, has largely threatened financial services in view of security and illegal access to banking networks. Anonymity and identity theft has endangered electronic commerce by crimes like phishing, fraud and different types...

متن کامل

Capturing security requirements for software systems

Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015