A systematic review of security requirements engineering

Computer Standards & Interfaces - Tập 32 - Trang 153-165 - 2010
Daniel Mellado1, Carlos Blanco2, Luis E. Sánchez3, Eduardo Fernández-Medina2
1Spanish Tax Agency. Madrid, Spain
2Department of Information Technologies and Systems. University of Castilla-La Mancha. Alarcos Research Group. Paseo de la Universidad, 4. Ciudad Real, Spain
3SICAMAN Nuevas Tecnologías. Tomelloso, Ciudad Real, Spain

Tài liệu tham khảo

Walton, 2002, Developing a enterprise information security policy Choo, K.-K.R., R.G. Smith, and R. McCusker, Future directions in technology-enabled crime: 2007–09, in Research and Public Policy Series, Australian_Government, Editor. 2007, Australian Institute of Criminology Zulkernine, 2006, Software security engineering: toward unifying software engineering and security engineering, 10.4018/978-1-59140-911-3.ch014 Konrad, S., B.H.C. Chengy, L.A. Campbell, and R. Wassermann, Using Security Patterns to Model and Analyze Security Requirements, in High Assurance Systems Workshop (RHAS 03) as part of the IEEE Joint International Conference on Requirements Engineering (RE 03): Monterey Bay, CA (USA). Viega, 2005, Building security requirements with CLASP, 1 Firesmith, 2004, Specifying reusable security requirements, 61 Kim, 2005, Goal and scenario bases domain requirements analysis environment, 926 Kotonya, 1998, Requirements engineering process and techniques, 294 McDermott, 1999, Using abuse case models for security requirements analysis, 10.1109/CSAC.1999.816013 Henning, 2006, Security engineering: it is all about control and assurance objectives Villarroel, 2005, Secure information systems development — a survey and comparison, 308 Mellado, 2006, A comparative study of proposals for establishing security requirements for the development of secure information systems, 3, 1044 Moffett, 2003, A framework for security requirements engineering, 368 Kitchenham, 2004, Procedures for Perfoming Systematic Review Brereton, 2007, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst. Software, 80, 571, 10.1016/j.jss.2006.07.009 Kitchenham, B., Guideline for performing Systematic Literature Reviews in Software Engineering. Version 2.3. 2007, University of Keele (Software Engineering Group, School of Computer Science and Mathematics) and Durham (Department of Computer Science). Biolchini, 2005, Systematic review in software engineering Firesmith, 2003, Engineering security requirements, Journal of Object Technology, 2, 53, 10.5381/jot.2003.2.1.c6 Basin, 2003, Model-driven security for process-oriented systems. SACMAT'03, 100 Basin, 2006, Model driven security: from UML models to access control infrastructures, ACM Trans. Softw. Eng. Methodol., 15, 39, 10.1145/1125808.1125810 Bresciani, 2004, Tropos: agent-oriented software development methodology, 203 Giorgini, 2004, Requirements engineering meets trust management: model, methodology, and reasoning. iTrust 2004, 176 Giorgini, 2006 Ali, 2008, Location-based software modeling and analysis: Tropos-based approach, in 27th International Conference on Conceptual Modeling (ER 08) Ali, 2009, A goal modeling framework for self-contextualizable software, in 14th international conference on exploring modeling methods in systems analysis and design (EMMSAD09) Dalpiaz, 2009, 246 Massacci, 2005, Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation, in Computers Standards and Interfaces, 445 Compagna, 2009, How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns, Artif. Intell. Law, 17, 1, 10.1007/s10506-008-9067-3 Firesmith, 2005, Engineering safety-related requirements for software-intensive systems, in Proceedings of the 27th international conference on Software engineering Firesmith, 2007, Engineering safety and security related requirements for software intensive systems, in international conference on software engineering, 169 Hussein, 2007, Intrusion detection aware component-based systems: a specification-based framework, J. Syst. Softw., 80, 700, 10.1016/j.jss.2006.08.017 Jennex, 2005, Modeling security requirements for information systems development Lee, 2003, A CC-based Security Engineering Process Evaluation Model. 27th Annual International Computer Software and Applications Conference (COMPSAC'03), 130 Lee, 2006, Building problem domain ontology from security requirements in regulatory documents, in Proceedings of the 2006 international workshop on Software engineering for secure systems Mead, 2005, Security Quality Requirements Engineering (SQUARE) Methodology. in Software Engineering for Secure Systems (SESS05), ICSE 2005 International Workshop on Requirements for High Assurance Systems Mead, 2006, 149 Abu-Nimeh, 2009, Integrating privacy requirements into security requirements engineering, SEKE, 542 Mellado, 2007, A common criteria based security requirements engineering process for the development of secure information systems, 244 Mellado, 2008, Towards security requirements management for software product lines: a security domain requirements engineering process, 361 Haley, 2008, Security requirements engineering: a framework for representation and analysis, IEEE Trans. Software Eng., 34, 133, 10.1109/TSE.2007.70754 Morimoto, 2006, A security requirement management database based on ISO/IEC 15408, 3, 1 Horie, 2008, ISEDS: an information security engineering database system based on ISO Standards, 1219 Myagmar, 2005, Threat modeling as a basis for security requirements Peeters, 2005, Agile security requirements engineering Popp, 2003, Security-critical system development with extended use cases, 478 Jürjens, 2002, UMLsec: extending UML for secure systems development. UML, 412 Jürjens, 2008, Automated analysis of permission-based security using UMLsec, 292 Shin, 2007, Software requirements and architecture modeling for evolving non-secure applications into secure applications, Sci. Comput. Program., 66, 60, 10.1016/j.scico.2006.10.009 Sindre, 2005, Eliciting security requirements with misuse cases, Requirements Eng., 10, 34, 10.1007/s00766-004-0194-4 Sindre, 2003, A reuse-based approach to determining security requirements. in Proc. 9th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'03) Opdahl, A.L. and G. Sindre, Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology. In Press, Corrected Proof, 2008. Stalhane, 2008, Safety hazard identification by misuse cases: experimental comparison of text and diagrams, 721 Toval, 2001, Requirements reuse for improving information systems security: a practitioner's approach, 205 Martínez, 2006, An audit method of personal data based on requirements engineering Nicolás, 2006, A collaborative learning experience in modelling the requirements of teleoperated systems for ship hull maintenance, in workshop on learning software organizations and requirements engineering Lasheras, 2008, An ontology-based framework for modelling security requirements, in The 6th International Workshop on Security in Information Systems — WOSIS Tsoumas, 2006, Towards an ontology-based security management. Proceedings of the 20th International Conference on Advanced Information Networking and Applications. IEEE Computer Society Tsoumas, 2006, Security-by-ontology: a knowledge-centric approach, 99 Yu, 1997, Towards modelling and reasoning support for early-phase requirements engineering, 226 Yu, 2006, A social ontology for integrating security and software engineering, in integrating security and software engineering: advances and future visions Yu, 2009, Social modeling and i*, 99 Zuccato, 2004, Holistic security requirement engineering for electronic commerce, 63 Zuccato, 2007, Holistic security management framework applied in electronic commerce, Computer & Security, 26, 256, 10.1016/j.cose.2006.11.003 Zuccato, 2008, Security requirements engineering at a telecom provider, 1139 Lamsweerde, 2007, Engineering requirements for system reliability and security, in software system reliability and security, 196 Firesmith, 2003, Security use cases, Journal of Object Technology, 53, 10.5381/jot.2003.2.3.c6 Best, 2007, Model-based security engineering of distributed information systems using UMLSec, 581 Whittle, 2008, Executable misuse cases for modeling security concerns, 121 Braz, 2008, Eliciting security requirements through misuse activities, 328 CRAMM, 2005, CRAMM, United Kingdom Central Computer and Telecommunication Agency. CCTA Risk Analysis and Management Method: User Manual, ver. 5.1 COBIT, 2005, COBIT, IT Governance Institute. Control Objectives for Information and related Technology (COBIT 4.0) Khawaja, 2002, A synthesis of evaluation criteria for software specifications and specifications techniques, International Journal of Software Engineering and Knowledge Engineering, 12, 581, 10.1142/S0218194002001062 IEEE, 1998, IEEE 830: 1998 recommended practice for software requirements specifications Mead, 2007, How to compare the Security Quality Requirements Engineering (SQUARE) method with other methods Hatebur, 2008, A formal metamodel for problem frames, Vol. 5301, 68