2015
DOI: 10.1007/s00766-015-0220-8
|View full text |Cite
|
Sign up to set email alerts
|

Reusable knowledge in security requirements engineering: a systematic mapping study

Abstract: International audienceSecurity is a concern that must be taken into consideration starting from the early stages of system development. Over the last two decades, researchers and engineers have developed a considerable number of methods for security requirements engineering. Some of them rely on the (re)use of security knowledge. Despite some existing surveys about security requirements engineering , there is not yet any reference for researchers and practitioners that presents in a systematic way the existing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 50 publications
(27 citation statements)
references
References 72 publications
(82 reference statements)
0
27
0
Order By: Relevance
“…However, as pointed out by Souag et al, security knowledge is hard to acquire for software designers in reality [26]. Without bridging the knowledge gap, the assumptions made in the above approaches become unrealistic, preventing the real adaption of those attack analysis approaches.…”
Section: Discussion and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, as pointed out by Souag et al, security knowledge is hard to acquire for software designers in reality [26]. Without bridging the knowledge gap, the assumptions made in the above approaches become unrealistic, preventing the real adaption of those attack analysis approaches.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Souag et al survey reusable knowledge-based security requirements engineering approaches over the last 20 years, which shows that 9 out of 95 surveyed papers represent reusable knowledge in the form of patterns (other forms include catalogs, taxonomies, etc.) [26]. Although patterns can be reused in a comparatively easy manner, Araujo et al have pointed out that analysts need first to have a thorough understanding of available patterns in order correctly select and apply them [33].…”
Section: Practical Challenges In Reusing Attack Patternsmentioning
confidence: 99%
“…The reader may refer to the tutorial in [42] to know about all the concepts and relations used in Secure Tropos. The choice of Secure Tropos was motivated by the fact that it is one of the richer modeling frameworks in terms of concepts that are used to model security requirements according to a recent systematic mapping study [11] on the subject. However, one needs to be "knowledgeable" about security and security requirements when using Secure Tropos, which is not always the case as reported in the introduction.…”
Section: The Aman-da Methodsmentioning
confidence: 99%
“…The security goals being not enough to generate security requirements, two ontologies (security and domain ones) were used as a source of knowledge to discover threats, vulnerabilities, security requirements and their actors, organizational goals, and other domain specific concepts. Acknowledging the small number of publications tackling this issue and providing an evaluation of proposals on real cases [11], we felt the motivation and necessity to undertake this empirical research.…”
Section: Introductionmentioning
confidence: 99%
“…These are considering as technical choice made during implementation [1]. The different between security and privacy is that threats to individual privacy often rise from authorized users of the system rather than from unauthorized one [2].…”
Section: Introductionmentioning
confidence: 99%