2010
DOI: 10.4018/jsse.2010102004
|View full text |Cite
|
Sign up to set email alerts
|

Security Requirements Engineering for Evolving Software Systems

Abstract: Long-lived software systems often undergo evolution over an extended period. Evolution of these systems is inevitable as they need to continue to satisfy changing business needs, new regulations and standards, and introduction of novel technologies. Such evolution may involve changes that add, remove, or modify features; or that migrate the system from one operating platform to another. These changes may result in requirements that were satisfied in a previous release of a system not being satisfied in subsequ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
2
1

Relationship

4
3

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 132 publications
0
5
0
Order By: Relevance
“…Several requirements engineering approaches have been proposed and they have been surveyed in (Nhlabatsi, Nuseibeh, & Yu, 2009). We categorize them in goal-oriented, problem-based and risk-based security requirements methods.…”
Section: Security Requirementsmentioning
confidence: 99%
“…Several requirements engineering approaches have been proposed and they have been surveyed in (Nhlabatsi, Nuseibeh, & Yu, 2009). We categorize them in goal-oriented, problem-based and risk-based security requirements methods.…”
Section: Security Requirementsmentioning
confidence: 99%
“…Unlike the runtime-monitoring framework proposed by Salifu et al [10], in this work we concentrate on the analysis at the development time. Nhlabatsi et al [11] survey the literature on security requirements and software evolution, where the management of evolving security requirements is identified as an outstanding research issue.…”
Section: Aspect-oriented and Evolving Security Requirementsmentioning
confidence: 99%
“…Security requirements engineering: Several requirements engineering approaches for security engineering have been proposed [12], [13], and many of the approaches have been surveyed in [14], and here we briefly recall some of them to put this work into context.…”
Section: Related Workmentioning
confidence: 99%
“…ATMSystem M: " A i r T r a f f i c Management System " 9 10 O p e r a t o r B : "ATC O p e r a t o r " 11 12 O p e r a t o r − > ATMSystem : " a " 13 14 ATMSystem − > A i r c r a f t : " b " 15 16 HasWData˜> A i r c r a f t : " r " …”
Section: A Concrete Syntaxmentioning
confidence: 99%