Skip to main content

2018 | OriginalPaper | Buchkapitel

A Template for Writing Security Requirements

verfasst von : Massila Kamalrudin, Nuridawati Mustafa, Safiah Sidek

Erschienen in: Requirements Engineering for Internet of Things

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Quality security requirements contribute to the success of secure software development. However, the process of eliciting and writing security requirements is tedious and complex, It requires Requirements Engineers (RE) to have security experience in the process of eliciting consistent security requirements from the clients-stakeholders. Considering the requirements are derived from natural language, RE faced problems in eliciting and writing security requirements as they have the tendency to misunderstand the real needs and the security terms used. Motivated from these problems, this paper proposed a security requirements library and template to assist RE in writing security requirements. The library was built based on compilation of security attributes derived from syntax analysis and keywords matching. The realization of the library and writing template was demonstrated using two sets of scenario taken from real projects. The usage examples show that the template is able to help the RE to write security requirements by providing the relevant and suitable sentence structure as guidance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat El-Hadary, H., El-Kassas, S.: Capturing security requirements for software systems. J. Adv. Res. 5(4), 463–472 (2014)CrossRef El-Hadary, H., El-Kassas, S.: Capturing security requirements for software systems. J. Adv. Res. 5(4), 463–472 (2014)CrossRef
2.
Zurück zum Zitat Zhivich, M., Cunningham, R.K.: The real cost of software errors. IEEE Secur. Priv. 2(2), 87–90 (2009)CrossRef Zhivich, M., Cunningham, R.K.: The real cost of software errors. IEEE Secur. Priv. 2(2), 87–90 (2009)CrossRef
3.
Zurück zum Zitat Salini, P., Kanmani, S.: Survey and analysis on security requirements engineering. Comput. Electr. Eng. 38, 1785–1797 (2012)CrossRef Salini, P., Kanmani, S.: Survey and analysis on security requirements engineering. Comput. Electr. Eng. 38, 1785–1797 (2012)CrossRef
4.
Zurück zum Zitat Riaz, M., King, J., Slankas, J., Williams, L.: Hidden in plain sight: automatically identifying security requirements from natural language artifacts. In: IEEE 22nd International Requirements Engineering Conference, RE 2014, pp. 183–192 (2014) Riaz, M., King, J., Slankas, J., Williams, L.: Hidden in plain sight: automatically identifying security requirements from natural language artifacts. In: IEEE 22nd International Requirements Engineering Conference, RE 2014, pp. 183–192 (2014)
5.
Zurück zum Zitat Yu, E.S.K.: Towards modelling and reasoning support for early-phase requirements engineering. In: IEEE 3rd International Symposium on Requirements Engineering, ISRE 1997, pp. 226–235 (1997) Yu, E.S.K.: Towards modelling and reasoning support for early-phase requirements engineering. In: IEEE 3rd International Symposium on Requirements Engineering, ISRE 1997, pp. 226–235 (1997)
6.
Zurück zum Zitat Mellado, D., Blanco, C., Sánchez, L.E., Fernández-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interfaces 32, 153–165 (2010)CrossRef Mellado, D., Blanco, C., Sánchez, L.E., Fernández-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interfaces 32, 153–165 (2010)CrossRef
7.
Zurück zum Zitat Houmb, S.H., Islam, S., Knauss, E., Jürjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec. Requir. Eng. 15(1), 63–93 (2010).CrossRef Houmb, S.H., Islam, S., Knauss, E., Jürjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec. Requir. Eng. 15(1), 63–93 (2010).CrossRef
8.
Zurück zum Zitat Banerjee, A., Sharma, M., Banerjee, C., Pandey, S.K.: Research on security requirements engineering: problems and prospects. MATRIX Acad. Int. Online J. Eng. Technol. 3(1), 32–35 (2015) Banerjee, A., Sharma, M., Banerjee, C., Pandey, S.K.: Research on security requirements engineering: problems and prospects. MATRIX Acad. Int. Online J. Eng. Technol. 3(1), 32–35 (2015)
9.
Zurück zum Zitat Firesmith, D.G.: Engineering security requirements. J. Object Technol. 2(1), 53–68 (2003)CrossRef Firesmith, D.G.: Engineering security requirements. J. Object Technol. 2(1), 53–68 (2003)CrossRef
10.
Zurück zum Zitat Jindal, R., Malhotra, R., Jain, A.: Automated classification of security requirements. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI 2016), pp. 2027–2033 (2016) Jindal, R., Malhotra, R., Jain, A.: Automated classification of security requirements. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI 2016), pp. 2027–2033 (2016)
11.
Zurück zum Zitat Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133–153 (2008)CrossRef Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133–153 (2008)CrossRef
12.
Zurück zum Zitat CCRA: Common Criteria for Information Technology Security Evaluation (Part 2: Security Functional Components) (2017) CCRA: Common Criteria for Information Technology Security Evaluation (Part 2: Security Functional Components) (2017)
13.
Zurück zum Zitat CCRA: Common Criteria for Information Technology Security Evaluation (Part 1: Introduction and General Model) (2017) CCRA: Common Criteria for Information Technology Security Evaluation (Part 1: Introduction and General Model) (2017)
14.
Zurück zum Zitat ISO/IEC: International Standard ISO/IEC 27000 (Information Technology — Security Techniques — Information Security Management Systems — Overview and Vocabulary) (2016) ISO/IEC: International Standard ISO/IEC 27000 (Information Technology — Security Techniques — Information Security Management Systems — Overview and Vocabulary) (2016)
15.
Zurück zum Zitat Kamalrudin, M., Grundy, J., Hosking, J.: Tool support for essential use cases to better capture software requirements. In: ACM the International Conference on Automated Software Engineering, ASE 2010, pp. 255–264 (2010) Kamalrudin, M., Grundy, J., Hosking, J.: Tool support for essential use cases to better capture software requirements. In: ACM the International Conference on Automated Software Engineering, ASE 2010, pp. 255–264 (2010)
16.
Zurück zum Zitat Chua, F.-F., Ngazizan, S.A., Hassan, M.: Design and implementation of airline reservation web services using service-oriented architecture. In: World Congress on Engineering 2010 (2010) Chua, F.-F., Ngazizan, S.A., Hassan, M.: Design and implementation of airline reservation web services using service-oriented architecture. In: World Congress on Engineering 2010 (2010)
18.
Zurück zum Zitat Riaz, M., Stallings, J., Singh, M.P., Slankas, J., Williams, L.: DIGS – a framework for discovering goals for security requirements engineering. In: ACM International Symposium on Empirical Software Engineering and Measurement (ESEM 2016) (2016) Riaz, M., Stallings, J., Singh, M.P., Slankas, J., Williams, L.: DIGS – a framework for discovering goals for security requirements engineering. In: ACM International Symposium on Empirical Software Engineering and Measurement (ESEM 2016) (2016)
19.
Zurück zum Zitat Riaz, M., Elder, S., Williams, L.: Systematically developing prevention, detection, and response patterns for security requirements. In: The 3rd International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) (2016) Riaz, M., Elder, S., Williams, L.: Systematically developing prevention, detection, and response patterns for security requirements. In: The 3rd International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) (2016)
20.
Zurück zum Zitat Riaz, M., Slankas, J., King, J., Williams, L.: Using templates to elicit implied security requirements from functional requirements - a controlled experiment. In: ACM the 8th International Symposium on Empirical Software Engineering and Measurement, ESEM 2014, p. 22 (2014) Riaz, M., Slankas, J., King, J., Williams, L.: Using templates to elicit implied security requirements from functional requirements - a controlled experiment. In: ACM the 8th International Symposium on Empirical Software Engineering and Measurement, ESEM 2014, p. 22 (2014)
21.
Zurück zum Zitat Motil, A., Hamid, B., Lanusse, A., Bruel, J.-M., Motii, A., Hamid, B., Lanusse, A., Jean-Michel, B.: Guiding the selection of security patterns based on security requirements and pattern classification. In: ACM the 20th European Conference on Pattern Languages of Programs, EuroPLoP 2015, pp. 10:1–10:17 (2015) Motil, A., Hamid, B., Lanusse, A., Bruel, J.-M., Motii, A., Hamid, B., Lanusse, A., Jean-Michel, B.: Guiding the selection of security patterns based on security requirements and pattern classification. In: ACM the 20th European Conference on Pattern Languages of Programs, EuroPLoP 2015, pp. 10:1–10:17 (2015)
22.
Zurück zum Zitat Beckers, K., Côté, I., Goeke, L.: A catalog of security requirements patterns for the domain of cloud computing systems. In: ACM the 29th Symposium on Applied Computing, pp. 337–342 (2014) Beckers, K., Côté, I., Goeke, L.: A catalog of security requirements patterns for the domain of cloud computing systems. In: ACM the 29th Symposium on Applied Computing, pp. 337–342 (2014)
24.
Zurück zum Zitat Yusop, N., Kamalrudin, M., Sidek, S., Grundy, J.: Automated support to capture and validate security requirements for Mobile Apps. Commun. Comput. Inf. Sci. 671, 97–112 (2016) Yusop, N., Kamalrudin, M., Sidek, S., Grundy, J.: Automated support to capture and validate security requirements for Mobile Apps. Commun. Comput. Inf. Sci. 671, 97–112 (2016)
25.
Zurück zum Zitat Salini, P., Kanmani, S.: Elicitation of security requirements for e-health system by applying Model Oriented Security Requirements Engineering (MOSRE) framework. In: ACM the Second International Conference on Computational Science, Engineering and Information Technology, CCSEIT 2012, pp. 126–131 (2012) Salini, P., Kanmani, S.: Elicitation of security requirements for e-health system by applying Model Oriented Security Requirements Engineering (MOSRE) framework. In: ACM the Second International Conference on Computational Science, Engineering and Information Technology, CCSEIT 2012, pp. 126–131 (2012)
Metadaten
Titel
A Template for Writing Security Requirements
verfasst von
Massila Kamalrudin
Nuridawati Mustafa
Safiah Sidek
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7796-8_6