2015
DOI: 10.1007/978-3-319-15618-7_13
|View full text |Cite
|
Sign up to set email alerts
|

A Security Ontology for Security Requirements Elicitation

Abstract: International audienceSecurity is an important issue that needs to be taken into account at all stages of information system development, including early requirements elicitation. Early analysis of security makes it possible to predict threats and their impacts and define adequate security requirements before the system is in place. Security requirements are difficult to elicit, analyze, and manage. The fact that analysts' knowledge about security is often tacit makes the task of security requirements elicitat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 45 publications
(29 citation statements)
references
References 29 publications
0
29
0
Order By: Relevance
“…(b) The method is generic in the sense that it is designed to be used with a generic security ontology [12] and any domain ontologies; as long as they embed, some expected knowledge. (c) The defined rules allow the method to automatically exhibit an appropriate ontological semantics (security and domain specific) to the engineer in charge of requirements elicitation (agents, objects, threats, security requirements, etc.).…”
Section: The Aman-da Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…(b) The method is generic in the sense that it is designed to be used with a generic security ontology [12] and any domain ontologies; as long as they embed, some expected knowledge. (c) The defined rules allow the method to automatically exhibit an appropriate ontological semantics (security and domain specific) to the engineer in charge of requirements elicitation (agents, objects, threats, security requirements, etc.).…”
Section: The Aman-da Methodsmentioning
confidence: 99%
“…A controlled experiment with end-users was performed to evaluate its usability. The paper [12] presents in detail the construction of the ontology, its concepts and relations and reports its evaluation. …”
Section: Ontologies In Aman-damentioning
confidence: 99%
See 1 more Smart Citation
“…Using a domain ontology [30] would greatly simplify the requirements analyst's effort in refining norms. In addition, the process of norm extraction from requirements can be automated via adopting a natural language processing approach.…”
Section: Scalabilitymentioning
confidence: 99%
“…[11]; [12]; [13]; [14]; [15,16]; [17]; [18]; [19]; [20]; [21]; [22]; [23]; [24]; [25]; [26]; [27]; [28]; [29]; [30]; [31]; [32]; [33]; [34]; [35]; [36]; [37]; [38]; [39]; [40]; [41]; [42]; [43]; [44]; [45]; [44]; [8]; [46]; [47]. Generic and abstract proposals (Top-Level Ontologies) can be found in [48], [3], [49], [50], and [51]. Specific proposals (Task and Application Ontologies) can be found in [52], [53], and [54].…”
Section: Surveymentioning
confidence: 99%