2013 IEEE Conference on Open Systems (ICOS) 2013
DOI: 10.1109/icos.2013.6735072
|View full text |Cite
|
Sign up to set email alerts
|

A review on tool supports for security requirements engineering

Abstract: Capturing the right security requirements is crucial when developing a security software. Poor elicited security requirements can lead to a failure in software development, thus it needs to be accurately defined. This study evaluates various security requirement engineering tools and analyses the existing gaps in security requirement engineering tools. Based on a literature search conducted manually, we report our findings from the review and analysis of different studies of security requirements engineering t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 17 publications
0
3
0
1
Order By: Relevance
“…Taking into account the security support, seven requirement engineering tools were analysed in [48]. Covered features for the analysis were methodology (e.g., model-driven engineering, goal-oriented approach, Secure Tropos), the source of security element, the requirement formality, and the support for the requirements engineering activities (i.e., elicitation, specification, analysis, and verification).…”
Section: Related Workmentioning
confidence: 99%
“…Taking into account the security support, seven requirement engineering tools were analysed in [48]. Covered features for the analysis were methodology (e.g., model-driven engineering, goal-oriented approach, Secure Tropos), the source of security element, the requirement formality, and the support for the requirements engineering activities (i.e., elicitation, specification, analysis, and verification).…”
Section: Related Workmentioning
confidence: 99%
“…Yahya et al [126] conducted a review on tool supports for security requirements engineering. The study has evaluated seven tools developed to deal with security requirements engineering and identified the problems and gaps existing.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Outros trabalhos de pequisa avaliaram ferramentas de ERS, como por exemplo [Carrillo De Gea et al 2012], [Zowghi and Coulin 2005], [Carrillo de Gea et al 2011] e [Yahya et al 2013]. Porém, ao contrário de trabalhos que se concentram em atividades ou aspectos específicos de ERS, como [Zowghi and Coulin 2005] e [Yahya et al 2013], as características aqui analisadas abrangem todas as cinco principais categorias de atividades da ERS e mais um conjunto de características gerais de ferramentas de apoio a ERS.…”
Section: Conclusõesunclassified