Security Requirements Elicitation and Assessment Mechanism (SecREAM)

被引:0
|
作者
Goel, Rajat [1 ]
Govil, M. C. [1 ]
Singh, Girdhari [1 ]
机构
[1] Malaviya Natl Inst Technol, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
关键词
SecREAM; software development life cycle; requirement elicitation; assessment mechanism; SaaS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, when most of the software are web-based or cloud-based having a variety of stakeholders with intertwined requirements, developing secure software is a complex issue. Usually, security is neglected during the development process. Now, the researchers emphasize on inclusion of security in development process, especially during the early phases. This paper suggests Security Requirements Elicitation and Assessment Mechanism (SecREAM), a novel methodology to imbibe security right from the inception of the software. It is applicable to both kinds of software-on premise and on cloud. The crux of the methodology lies in actively involving all kinds of stakeholders and ranking of the required assets on the basis of certain parameters that will facilitate a well - understood design and help in making better technical and non-technical decisions later during the course of development.
引用
收藏
页码:1862 / 1866
页数:5
相关论文
共 50 条
  • [21] ASSESSMENT AND CONTROL OF THE REQUIREMENTS ELICITATION PROCESS IN A CASE ENVIRONMENT
    GYORKOS, J
    ROZMAN, I
    INFORMATION SYSTEM DEVELOPMENT PROCESS, 1993, 30 : 135 - 146
  • [22] Presentation and Validation of Method for Security Requirements Elicitation from Business Processes
    Ahmed, Naved
    Matulevicius, Raimundas
    INFORMATION SYSTEMS ENGINEERING IN COMPLEX ENVIRONMENTS, 2015, 204 : 20 - 35
  • [23] Safety-Focused Security Requirements Elicitation for Medical Device Software
    Lindvall, Mikael
    Diep, Madeline
    Klein, Michele
    Jones, Paul
    Zhang, Yi
    Vasserman, Eugene
    2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2017, : 134 - 143
  • [24] Assessment and Evaluation of Requirements Elicitation Techniques Using Analysis Determination Requirements Framework
    Besrour, Souhaib
    Rahim, Lukman Bin A. B.
    Dominic, P. D. D.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2014,
  • [25] What lies behind requirements? A quality assessment of statement grounds in requirements elicitation
    Burnay, Corentin
    Bouraga, Sarah
    Gillain, Joseph
    Jureta, Ivan J.
    SOFTWARE QUALITY JOURNAL, 2020, 28 (04) : 1615 - 1643
  • [26] What lies behind requirements? A quality assessment of statement grounds in requirements elicitation
    Corentin Burnay
    Sarah Bouraga
    Joseph Gillain
    Ivan J. Jureta
    Software Quality Journal, 2020, 28 : 1615 - 1643
  • [27] Development of Agile Security Framework Using a Hybrid Technique for Requirements Elicitation
    Sonia
    Singhal, Archana
    ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL, 2011, 125 : 178 - 188
  • [28] Understanding the Role of Human-Related Factors in Security Requirements Elicitation
    Alwidian, Sanaa
    Jaskolka, Jason
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2023, 2023, 13975 : 65 - 74
  • [29] Security Requirements Elicitation from Engineering Governance, Risk Management and Compliance
    Ghiran, Ana-Maria
    Buchmann, Robert Andrei
    Osman, Cristina-Claudia
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY (REFSQ 2018), 2018, 10753 : 283 - 289
  • [30] Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats
    Kim, Seung-Jun
    Lee, Seok-Won
    REQUIREMENTS ENGINEERING FOR INTERNET OF THINGS, 2018, 809 : 29 - 40