2014 Ninth International Conference on Availability, Reliability and Security 2014
DOI: 10.1109/ares.2014.73
|View full text |Cite
|
Sign up to set email alerts
|

Using Assurance Cases to Develop Iteratively Security Features Using Scrum

Abstract: A security feature is a customer-valued capability of software for mitigating a set of security threats. Incremental development of security features, using the Scrum method, often leads to developing ineffective features in addressing the threats they target due to factors such as incomplete security tests. This paper proposes the use of security assurance cases to maintain a global view of the security claims as the feature is being developed iteratively and a process that enables the incremental development… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(17 citation statements)
references
References 11 publications
0
17
0
Order By: Relevance
“…Rein, C. Rudolph, J. F. Ruiz and M. Arjona [22] described the new Security Engineering Process with the In 2014, L. b. Othmane, P. Angin and B. Bhargava [24] proposed the use of security assurance cases that are developed iteratively. The extension of the Scrum method discovered by Takeuchi and Nonakais are used.…”
Section: Methodologiesmentioning
confidence: 99%
“…Rein, C. Rudolph, J. F. Ruiz and M. Arjona [22] described the new Security Engineering Process with the In 2014, L. b. Othmane, P. Angin and B. Bhargava [24] proposed the use of security assurance cases that are developed iteratively. The extension of the Scrum method discovered by Takeuchi and Nonakais are used.…”
Section: Methodologiesmentioning
confidence: 99%
“…As a quality check for our search string, we ensured that we would find three relevant, known studies (Finnegan and McCaffery 2014a;Ben Othmane et al 2014;Xu et al 2017) with the search string. This was to make sure that our search string would return all three relevant studies, hence confirming its validity.…”
Section: Constructing the Search Stringmentioning
confidence: 99%
“…-Integrating SAC in the development life-cycle: These approaches suggest mapping the SAC creation activities to the development activities to integrate SACs in the development and security processes (Agudo et al 2009;Ben Othmane et al 2014; Ray and (Sklyar and Kharchenko 2016, 2017a, b, 2019. In general, these approaches suggest that the different stages of software development (requirements, design, implementation, and deployment) correspond to different abstraction levels of the security claims that can be made on the system.…”
Section: Rq2: Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Othmane et al [20] proposed integrating security reassurance into the agile software development processes to ensure the security of the developed software with each iteration. In addition, they demonstrated the use of the technique to iteratively develop security features that fulfill their security requirements [21]. The process helps, for example, to identify customer change requests that conflict with the security requirements of the iteration.…”
Section: Related Workmentioning
confidence: 99%