2014 IEEE 22nd International Requirements Engineering Conference (RE) 2014
DOI: 10.1109/re.2014.6912261
|View full text |Cite
|
Sign up to set email alerts
|

Managing security requirements patterns using feature diagram hierarchies

Abstract: Abstract-Security requirements patterns represent reusable security practices that software engineers can apply to improve security in their system. Reusing best practices that others have employed could have a number of benefits, such as decreasing the time spent in the requirements elicitation process or improving the quality of the product by reducing product failure risk. Pattern selection can be difficult due to the diversity of applicable patterns from which an analyst has to choose. The challenge is tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…In order to guide software practitioners into the proper utilization of security patterns in their projects, the security pattern research community must attend to the fine-grain details of selecting and applying patterns in practice. We have observed a variety of pattern selection techniques in the literature including the utilization of feature models (Nguyen et al, 2015), (Slavin et al, 2014), ontology (Arjona et al, 2014), (Guan et al, 2014), and selection rules (Li et al, 2014), (Pearson and Shen, 2010). There is a lesser degree of variety in the techniques used for applying patterns.…”
Section: Techniques For Selecting and Applying Security Patterns (Rq12)mentioning
confidence: 99%
“…In order to guide software practitioners into the proper utilization of security patterns in their projects, the security pattern research community must attend to the fine-grain details of selecting and applying patterns in practice. We have observed a variety of pattern selection techniques in the literature including the utilization of feature models (Nguyen et al, 2015), (Slavin et al, 2014), ontology (Arjona et al, 2014), (Guan et al, 2014), and selection rules (Li et al, 2014), (Pearson and Shen, 2010). There is a lesser degree of variety in the techniques used for applying patterns.…”
Section: Techniques For Selecting and Applying Security Patterns (Rq12)mentioning
confidence: 99%
“…The authors also summarize the techniques and methods used in these categories. Slavin et al [13] introduce the security requirement patterns that represent reusable security practices that software engineers can apply to improve security in their systems. The paper proposes a new method that combines an inquiry cycle-based approach with the feature diagram notation to review only relevant patterns and Modelling of IoT units for estimating quality of service A.…”
Section: (B) Security and Privacy Challenges Within Iotmentioning
confidence: 99%
“…Venckauskas et al [12] present the energy efficient SSL protocol that ensures the maximum bandwidth and the required level of security with minimum energy consumption. Slavin et al [13] introduce security-requirement patterns that represent reusable security practices that software engineers can apply to improve security in their systems. The paper proposes a new method that combines an inquiry-cycle-based approach with the feature diagram notation to review relevant patterns and quickly select the most appropriate patterns for the situation.…”
Section: Related Workmentioning
confidence: 99%