2014
DOI: 10.1016/j.jare.2014.03.001
|View full text |Cite
|
Sign up to set email alerts
|

Capturing security requirements for software systems

Abstract: Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 10 publications
(12 reference statements)
0
15
0
Order By: Relevance
“…This practical approach is currently adopted by most of the security practitioners. In essence, the integration of security strategies as a security framework while writing the source code would allow any security anomalies to be detected and fixed well before the software application is released (El-Hadary and El-Kassas, 2014). The framework will also allow the code to be audited for conformance which, as a result, will not only provide greater security but will also save time, costs and resources which might be incurred on redevelopment or patching of the software application once it is released.…”
Section: Discussionmentioning
confidence: 99%
“…This practical approach is currently adopted by most of the security practitioners. In essence, the integration of security strategies as a security framework while writing the source code would allow any security anomalies to be detected and fixed well before the software application is released (El-Hadary and El-Kassas, 2014). The framework will also allow the code to be audited for conformance which, as a result, will not only provide greater security but will also save time, costs and resources which might be incurred on redevelopment or patching of the software application once it is released.…”
Section: Discussionmentioning
confidence: 99%
“…Security and integrity was the key issue handled but it lacked reliability. H.El-Hadary et al [13] describes a methodology in which security catalog is made with the help of previous security knowledge. This methodology based on reusing of previous knowledge.…”
Section: Discussionmentioning
confidence: 99%
“…The questions were carefully crafted to explore Agile RE practices and developed in accordance with the study aim. The issues chosen for the interviews were outlined in the literature review in studies such as [3,4,8,10,15,18,20,27].…”
Section: Setting and Methodologymentioning
confidence: 99%
“…Assess the risk for the project if the requirement is implemented. [4] requirements to protect the system from potential attacks [8]. These frameworks vary in how security requirements are derived.…”
Section: Riskmentioning
confidence: 99%
See 1 more Smart Citation