2014
DOI: 10.4018/ijsse.2014100102
|View full text |Cite
|
Sign up to set email alerts
|

A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes

Abstract: While software security has become an expectation, stakeholders often have difficulty expressing such expectations. Elaborate (and expensive) frameworks to identify, analyze, validate and incorporate security requirements for large software systems (and organizations) have been proposed, however, small organizations working within short development lifecycles and minimal resources cannot justify such frameworks and often need a light and practical approach to security requirements engineering that can be easil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Justification: In cases where ASD teams, customers, and management have limited knowledge regarding QRs, they may not recognize, specify, and handle QRs properly. ASD teams may ignore and not document QRs until there is a specific request for handing them or until the impact of neglecting QRs becomes visible [5], [6], [10], [11], [38], [39].…”
Section: ) Recognize the Significance Of Qrsmentioning
confidence: 99%
See 1 more Smart Citation
“…Justification: In cases where ASD teams, customers, and management have limited knowledge regarding QRs, they may not recognize, specify, and handle QRs properly. ASD teams may ignore and not document QRs until there is a specific request for handing them or until the impact of neglecting QRs becomes visible [5], [6], [10], [11], [38], [39].…”
Section: ) Recognize the Significance Of Qrsmentioning
confidence: 99%
“…For instance, customers in the energy domain may overlook important QRs such as security [41]. Related Work: [5], [6], [8], [10], [30], [38]- [41] 2) RECOGNIZE THE NEED FOR OPTIMAL DOCUMENTATION OF QRs Description: Agile teams should acknowledge the need for optimal documentation of QRs (i.e., a satisfactory level of QR documentation that will not compromise agility and product quality). They should take actions to meet the need for optimal documentation of QRs and start documenting QRs at early stages.…”
Section: ) Recognize the Significance Of Qrsmentioning
confidence: 99%
“…We also noticed that in ASD, QR awareness of both practitioners and customers affect documentation. The lack of QR awareness by customers is a challenge in ASD [5], [27]. When considering practitioners, QR awareness may be seen a necessity for roles such as project managers and product owners and deemed less important for developers in some cases.…”
Section: B Factors Influencing Documentation Of Qrs In Asdmentioning
confidence: 99%
“…Tetmeyer et al . introduce a new approach for capturing such security requirements early in the development.…”
Section: Next‐generation Features and Their Security Risksmentioning
confidence: 99%