2016
DOI: 10.1007/s10664-016-9481-1
|View full text |Cite
|
Sign up to set email alerts
|

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates

Abstract: Context: Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security Discoverer process automatically identifies security implications of individual requirements sentences and suggests applicable security requirements templates.Goal: To support requirements analysts in identifying security requirements by automating the suggestion of security requireme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 32 publications
0
6
0
1
Order By: Relevance
“…Several studies have empirically compared [17,18,23] and conducted replications [16,24,26] requirement engineering techniques (e.g., requirements elicitation). For brevity, we direct the interested reader a comprehensive review by Ambreen et al [1].…”
Section: Related Workmentioning
confidence: 99%
“…Several studies have empirically compared [17,18,23] and conducted replications [16,24,26] requirement engineering techniques (e.g., requirements elicitation). For brevity, we direct the interested reader a comprehensive review by Ambreen et al [1].…”
Section: Related Workmentioning
confidence: 99%
“…In Figure 4 completeness status for each requirement (7) (8). They can also view the examples of each component if needed (11).…”
Section: Figure 2: User Interface Of Securemereq In Usedmentioning
confidence: 99%
“…Furthermore, attention should be given to the process of deploying updates with bug fixes. A web-based participant tool (e.g., [13], [14]) can be updated much more easily than a stand-alone tool (e.g., [10], [11]), for example.…”
Section: Study Execution Environmentmentioning
confidence: 99%
“…Currently, the necessary tools are created often for the specific purpose of single study, e.g. [10]- [14], and these tools are labor-intensive to create, test, maintain, evolve and reuse.…”
Section: Introductionmentioning
confidence: 99%