Requirements engineering in secure software systems: Factors that influence requirements risk analysis and risk management

被引:0
作者
Stinson, James [1 ]
Vaughn, Rayfford [1 ]
机构
[1] Mississippi State Univ, Dept Comp Sci & Engn, Mississippi State, MS 39759 USA
来源
WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS | 2006年
关键词
secure requirements; risk analysis; risk management; requirements engineering;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although a significant amount of research has been devoted to software engineering practices, methods for developing secure software systems have been somewhat overlooked by industry and academe, viewing security as something that is bolted on at the end of a project rather than baked into the development lifecycle. As software systems become more complex, are accessed by greater numbers of users, and contain more sensitive information, making sure applications are secure is becoming increasingly important. Within the last few years, there has been a renewed focus on developing secure software systems. Gathering, analyzing, and managing requirements for secure software projects are difficult because of factors related to cost, expertise, and time constraints. In addition, secure requirements often clash with traditional non-secure software requirements, which result in project delivery delays, increases in cost, reduction in quality, and stakeholder disappointment. In order to overcome these issues, it is necessary to understand the importance of secure requirements risk analysis and requirements risk management. This paper discusses these difficulties in relation to secure system risk analysis, and suggests methods for reducing or mitigating some of these issues.
引用
收藏
页码:342 / 345
页数:4
相关论文
共 11 条
[1]  
[Anonymous], PROCESSES PRODUCE SE
[2]  
[Anonymous], DOBBS J
[3]  
[Anonymous], 1998, SOFTWARE DEV
[4]   Avoiding the software model-clash spiderweb [J].
Boehm, B ;
Port, D ;
Al-Said, M .
COMPUTER, 2000, 33 (11) :120-122
[5]  
BOEHM B, 1999, SOFTWARE ENG NOTES, P36
[6]  
CAPLAN K, 1999, IEEE IT PROFESSI MAR, P29
[7]   Testing for security during development: Why we should scrap penetrate-and-patch [J].
McGraw, G .
IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 1998, 13 (04) :13-15
[8]  
MEAD NR, 2005, SOFTW ENG SEC SYST S
[9]  
MOFFETT JD, 200423 OP U
[10]  
Moore A., 2001, ATTACK MODELING INFO