Security Requirements Elicitation and Assessment Mechanism (SecREAM)

被引:0
|
作者
Goel, Rajat [1 ]
Govil, M. C. [1 ]
Singh, Girdhari [1 ]
机构
[1] Malaviya Natl Inst Technol, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
关键词
SecREAM; software development life cycle; requirement elicitation; assessment mechanism; SaaS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, when most of the software are web-based or cloud-based having a variety of stakeholders with intertwined requirements, developing secure software is a complex issue. Usually, security is neglected during the development process. Now, the researchers emphasize on inclusion of security in development process, especially during the early phases. This paper suggests Security Requirements Elicitation and Assessment Mechanism (SecREAM), a novel methodology to imbibe security right from the inception of the software. It is applicable to both kinds of software-on premise and on cloud. The crux of the methodology lies in actively involving all kinds of stakeholders and ranking of the required assets on the basis of certain parameters that will facilitate a well - understood design and help in making better technical and non-technical decisions later during the course of development.
引用
收藏
页码:1862 / 1866
页数:5
相关论文
共 50 条
  • [1] A Security Ontology for Security Requirements Elicitation
    Souag, Amina
    Salinesi, Camille
    Mazo, Raul
    Comyn-Wattiau, Isabelle
    ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
  • [2] Security Requirements Elicitation and Modeling Authorizations
    Goel, Rajat
    Govil, Mahesh Chandra
    Singh, Girdhari
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 239 - 250
  • [3] Requirements Elicitation and Derivation of Security Policy Templates
    Rudolph, Manuel
    Feth, Denis
    Doerr, Joerg
    Spilker, Joerg
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 283 - 292
  • [4] Security requirements elicitation: a smart health case
    Rabii, Anass
    Assoul, Saliha
    Roudies, Ounsa
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 776 - 781
  • [5] Security Requirements Elicitation from Business Processes
    Matulevicius, Raimundas
    BUSINESS PROCESS MANAGEMENT WORKSHOPS( BPM 2014), 2015, 202
  • [6] Existing Vulnerability Information in Security Requirements Elicitation
    Amin, Rayhan
    Bhowmik, Tanmay
    2022 IEEE 30TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2022, : 220 - 225
  • [7] A Combined Process for Elicitation and Analysis of Safety and Security Requirements
    Raspotnig, Christian
    Karpati, Peter
    Katta, Vikash
    ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2012, 2012, 113 : 347 - 361
  • [8] Security Requirements Elicitation from Airline Turnaround Processes
    Matulevicius, Raimundas
    Norta, Alex
    Samarutel, Silver
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2018, 60 (01): : 3 - 20
  • [9] SafeSec Tropos: Joint security and safety requirements elicitation
    Kavallieratos, Georgios
    Katsikas, Sokratis
    Gkioulos, Vasileios
    COMPUTER STANDARDS & INTERFACES, 2020, 70
  • [10] Towards a Common Security and Privacy Requirements Elicitation Methodology
    Makri, Eleni-Laskarina
    Lambrinoudakis, Costas
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159