2006
DOI: 10.1007/11863908_13
|View full text |Cite
|
Sign up to set email alerts
|

Applying a Security Requirements Engineering Process

Abstract: Abstract. Nowadays, security solutions are mainly focused on providing security defences, instead of solving one of the main reasons for security problems that refers to an appropriate Information Systems (IS) design. In fact, requirements engineering often neglects enough attention to security concerns. In this paper it will be presented a case study of our proposal, called SREP (Security Requirements Engineering Process), which is a standard-centred process and a reuse-based approach which deals with the sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(27 citation statements)
references
References 11 publications
0
27
0
Order By: Relevance
“…(l) Security requirements engineering framework (SREF) [32]: is based on constructing a context for the system using a problem-oriented notation to represent security requirements as constraints, and to develop and evaluate satisfaction arguments for the security requirements. (m) Security requirements engineering process (SREP) [18]: is an iterative and incremental process. Furthermore, SREP is asset-based, risk driven, and, following the Common Criteria (CC) supports the reuse of security requirements, as well as the reuse of knowledge on assets, threats, and countermeasures.…”
Section: The Security Requirements Engineering Methods Reviewedmentioning
confidence: 99%
“…(l) Security requirements engineering framework (SREF) [32]: is based on constructing a context for the system using a problem-oriented notation to represent security requirements as constraints, and to develop and evaluate satisfaction arguments for the security requirements. (m) Security requirements engineering process (SREP) [18]: is an iterative and incremental process. Furthermore, SREP is asset-based, risk driven, and, following the Common Criteria (CC) supports the reuse of security requirements, as well as the reuse of knowledge on assets, threats, and countermeasures.…”
Section: The Security Requirements Engineering Methods Reviewedmentioning
confidence: 99%
“…Many techniques have been proposed, including SQUARE [5,34], SREP [35,36], CLASP [40], misuse cases [33,47], and security patterns [27,45,48]. Related implementations have seen great success in practice, e.g., Microsoft uses the Security Development Lifecycle (SDL) for the development of their software that must withstand attacks [32], and Oracle has developed OSSA for the secure software development of their products [41].…”
Section: Kirin Security Rulesmentioning
confidence: 99%
“…In [10] as a tabular method we chose SREP [6] proposed by University of Castilla-La Mancha and used by CMU Software Engineering Institute in their tutorials. The participants worked in groups of two and conducted SRA of four security tasks from SmartGrid scenario using both methods.…”
Section: Retrospective Analysismentioning
confidence: 99%
“…Industry opts for tabular models like OCTAVE [4], ISO 27005 and NIST 800-30. Microsoft STRIDE [5] is the exception on the industry side and SREP [6] is the exception on the academic side.…”
Section: Introductionmentioning
confidence: 99%