2015
DOI: 10.7250/csimq.2015-3.02
|View full text |Cite
|
Sign up to set email alerts
|

Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

Abstract: Abstract. This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security information and knowledge sources and relevant compliance obligations, in a structured and reusable form. The resulting repository is intended to be used by development teams during the elicitation and analysis of security requirements with the goal to und… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Also, [34] finds out that most of the requirements reuse techniques are textual copy based and that there is a direct relationship between the requirements reuse and the adopted technology. Moreover, methods that extensively adopt requirements repositories such as [20,40,53] use them to construct requirement specification documents. The repository usability reduces at the design and implementation stage due to the manual linkages of the requirements.…”
Section: Related Workmentioning
confidence: 99%
“…Also, [34] finds out that most of the requirements reuse techniques are textual copy based and that there is a direct relationship between the requirements reuse and the adopted technology. Moreover, methods that extensively adopt requirements repositories such as [20,40,53] use them to construct requirement specification documents. The repository usability reduces at the design and implementation stage due to the manual linkages of the requirements.…”
Section: Related Workmentioning
confidence: 99%
“…The model, e.g. has been used to develop the security requirements and the architectural specifications concurrently [16]. The study shows that the requirement elicitation and architectural design activities should not be performed sequentially in a single phase within the development life cycle.…”
Section: Related Studiesmentioning
confidence: 99%