A Systematic Mapping Study on Security in Agile Requirements Engineering

被引:28
作者
Villamizar, Hugo [1 ]
Kalinowski, Marcos [1 ]
Viana, Marx [1 ]
Fernandez, Daniel Mendez [2 ]
机构
[1] Pontifical Catholic Univ Rio de Janeiro PUC Rio, Software Engn Lab, Rio De Janeiro, Brazil
[2] Tech Univ Munich, Software & Syst Engn, Garching, Germany
来源
44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018) | 2018年
关键词
agile methods; security; requirements engineering; systematic mapping study;
D O I
10.1109/SEAA.2018.00080
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
[Background] The rapidly changing business environments in which many companies operate is challenging traditional Requirements Engineering (RE) approaches. This gave rise to agile approaches for RE. Security, at the same time, is an essential non-functional requirement that still tends to be difficult to address in agile development contexts. Given the fuzzy notion of "agile" in context of RE and the difficulties of appropriately handling security requirements, the overall understanding of how to handle security requirements in agile RE is still vague. [Objective] Our goal is to characterize the publication landscape of approaches that handle security requirements in agile software projects. [Method] We conducted a systematic mapping to outline relevant work and contemporary gaps for future research. [Results] In total, we identified 21 studies that met our inclusion criteria, dated from 2005 to 2017. We found that the approaches typically involve modifying agile methods, introducing new artifacts (e.g., extending the concept of user story to abuser story), or introducing guidelines to handle security issues. We also identified limitations of using these approaches related to environment, people, effort and resources. [Conclusion] Our analysis suggests that more effort needs to be invested into empirically evaluating the existing approaches and that there is an avenue for future research in the direction of mitigating the identified limitations.
引用
收藏
页码:454 / 461
页数:8
相关论文
共 28 条
[1]  
Abrahamsson P., 2002, Proceedings of ESPOO 2002, P7
[2]  
Baca D., 2012, THESIS
[3]  
Bartsch S., 2011, AV REL SEC ARES 2011, P479, DOI DOI 10.1109/ARES.2011.82
[4]  
Budgen D., 2008, P PPIG 2008, P195, DOI DOI 10.1007/978-3-642-02152-7_36
[5]  
Chung L, 2012, Non-Functional Requirements in Software Engineering, V5, DOI DOI 10.1007/978-1-4615-5269-7
[6]  
Curcio K., 2018, J SYSTEMS SOFTWARE
[7]  
Devanbu P. T., 2000, P C FUT SOFTW ENG
[8]   Empirical studies of agile software development:: A systematic review [J].
Dyba, Tore ;
Dingsoyr, Torgeir .
INFORMATION AND SOFTWARE TECHNOLOGY, 2008, 50 (9-10) :833-859
[9]  
Ernst N. A., 2012, Proceedings of the 2012 IEEE Second International Workshop on Empirical Requirements Engineering (EmpiRE), P25, DOI 10.1109/EmpiRE.2012.6347678
[10]  
Fernandez D. Mendez, EMPIRICAL SOFTWARE E, V22, P2298