Identifying implied security requirements from functional requirements A replication on the use of security requirements templates

被引:0
作者
Martinez, Andres [1 ]
Jenkins, Marcelo [2 ]
Quesada-Lopez, Christian [2 ]
机构
[1] Univ Costa Rica, Posgrad Comp & Informat, San Jose, Costa Rica
[2] Univ Costa Rica, Escuela Ciencias Comp & Informat, San Jose, Costa Rica
来源
2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI) | 2019年
关键词
security requirements; requirements engineering; software engineering; replication; empirical study;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The elicitation of software security requirements in early stages of software development life cycle is an essential task. Using security requirements templates could help practitioners to identify implied software security requirements from functional requirements in the context of a software system. In this paper, we replicated a previous study that analyzed the effectiveness of security requirements templates to support the identification of security requirements. Our objective was to evaluate this approach and compare the applicability of the previous findings. We conducted the first replication of the controlled experiment in 2015, and subsequently conducted two differentiated replications in 2018. We evaluated the responses of 33 participants in terms of quality, coverage, relevance and efficiency and discussed insights regarding the impact of context factors. Participants were divided into treatment (security requirements templates) and control groups (no templates). Our findings support some previous results: treatment group performed significantly better than the control group in terms of the coverage of the identified security requirements. Besides, the requirements elicitation process performed significantly better in relevance and efficiency metrics in two of the three replications. Security requirements templates supported participants to identify a core set of the security requirements and participants were favorable towards the use of templates in identifying security requirements.
引用
收藏
页数:7
相关论文
共 15 条
  • [1] [Anonymous], 2010, 1 INT WORKSH REPL EM
  • [2] A comparison of security requirements engineering methods
    Fabian, Benjamin
    Guerses, Seda
    Heisel, Maritta
    Santen, Thomas
    Schmidt, Holger
    [J]. REQUIREMENTS ENGINEERING, 2010, 15 (01) : 7 - 40
  • [3] Haley C.B., 2006, SESS 06, P35
  • [4] Jensen M., 2015, Journal of the Academy of Nutrition and Dietetics, V115, pA67, DOI 10.1016/j.jand.2015.06.240
  • [5] The practice of secure software development in SDLC: an investigation through existing model and a case study
    Karim, Nor Shahriza Abdul
    Albuolayan, Arwa
    Saba, Tanzila
    Rehman, Amjad
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5333 - 5345
  • [6] Mead N.R., 2005, Software Engineering for Secure Systems (SESS), P1
  • [7] A systematic review of security requirements engineering
    Mellado, Daniel
    Blanco, Carlos
    Sanchez, Luis E.
    Fernandez-Medina, Eduardo
    [J]. COMPUTER STANDARDS & INTERFACES, 2010, 32 (04) : 153 - 165
  • [8] Quesada-Lopez C., 2016, 2016 IEEE 36 CENTRAL, P1
  • [9] Riaz M., 2012, 2012 IEEE Second International Workshop on Requirements Patterns (RePa 2012), P29, DOI 10.1109/RePa.2012.6359977
  • [10] Riaz M., 2014, ACM 8 INT S EMP SOFT, P22