2016 IEEE 24th International Requirements Engineering Conference Workshops (REW) 2016
DOI: 10.1109/rew.2016.025
|View full text |Cite
|
Sign up to set email alerts
|

Systematically Developing Prevention, Detection, and Response Patterns for Security Requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 7 publications
0
6
0
1
Order By: Relevance
“…The coverage is significantly better in three out of the four studies as well as in the combined analysis. Putting more effort into identifying a comprehensive set of security requirements templates is also warranted (Riaz, Elder et al 2016) based on our findings.…”
Section: Discussionmentioning
confidence: 87%
“…The coverage is significantly better in three out of the four studies as well as in the combined analysis. Putting more effort into identifying a comprehensive set of security requirements templates is also warranted (Riaz, Elder et al 2016) based on our findings.…”
Section: Discussionmentioning
confidence: 87%
“…-Elicit the security concerns: It is important to identify the sub-characteristics of security associated with the identified security features and requirements (in Table 1). For instance, for the feature/requirement, "the customer must authenticate to the AMI to access the information", essential aspects relevant to security such as goal, tasks are presented in The details of security tasks to achieve the authentication goal have considered the same way as identified by Riaz et al, (2016).…”
Section: Instantiating the Ifusmentioning
confidence: 99%
“…The details of each activity during the five phases of IFUS are as follows: Access software requirement specification document : To initiate the process, security and usability experts access the software requirement specification (SRS) to enumerate security requirements. Different knowledge sources can be used to initiate pattern writing, including individual experiences, standards and best practices, specifications and documents (Riaz et al , 2016). IFUS uses the SRS document for the said purpose. Enumerate the security features and focus areas : The security and usability experts access the SRS document to identify the security requirements of the system.…”
Section: Integrative Framework For Usable Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…They can also view the examples of each component if needed (11). Finally, he can view the overall completeness for all requirements (9) and Lew can decide whether to proceed with the requirements or amend it (10).…”
Section: Figure 2: User Interface Of Securemereq In Usedmentioning
confidence: 99%