skip to main content
article

Security quality requirements engineering (SQUARE) methodology

Published:15 May 2005Publication History
Skip Abstract Section

Abstract

Requirements engineering, a vital component in successful project development, often neglects sufficient attention to security concerns. Further, industry lacks a useful model for incorporating security requirements into project development. Studies show that upfront attention to security saves the economy billions of dollars. Industry is thus in need of a model to examine security and quality requirements in the development stages of the production lifecycle.In this paper, we examine a methodology for both eliciting and prioritizing security requirements on a development project within an organization. We present a model developed by the Software Engineering Institute's Networked Systems Survivability (NSS) Program, and then examine two case studies where the model was applied to a client system. The NSS Program continues to develop this useful model, which has proven effective in helping an organization understand its security posture.

References

  1. Soo Hoo, K., Sudbury, J. W., Jaquith, J. R. "Tangible ROI Through Secure Software Engineering", Secure Business Quarterly, Volume 1, Number 2, @stake, 2001.Google ScholarGoogle Scholar
  2. National Institute of Standards and Technology, "Software Errors Cost U.S. Economy $59.5 Billion Annually" (NIST 2002-10). http://www.nist.gov/public_affairs/releases/n02-10.htm (2002).Google ScholarGoogle Scholar
  3. Chen, P., Mead, N. R., Dean, M., Lopez, L., Ojoko-Adams, D., Osman, H. Xie, N. SQUARE Methodology: Case Study on Asset Management System (CMU/SEI-2004-SR-015). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2004.Google ScholarGoogle Scholar
  4. Chen, P., Mead, N. R., Dean, M., Lopez, L., Ojoko-Adams, D., Osman, H. Xie, N. SQUARE Methodology: Case Study on Asset Management System (CMU/SEI-2004-SR-015). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2004.Google ScholarGoogle Scholar
  5. Mead, N. "Requirements Elicitation and Analysis Processes for Safety & Security Requirements", 4th International Workshop on Requirements for High Assurance Systems, September 6, 2004, Kyoto, Japan, proceedings published by SEI:http://www.sei.cmu.edu/community/rhas-workshop/#papers.Google ScholarGoogle Scholar
  6. Student report to be sanitized and published by the SEI.Google ScholarGoogle Scholar
  7. Student report to be sanitized and published by the SEI.Google ScholarGoogle Scholar

Index Terms

  1. Security quality requirements engineering (SQUARE) methodology

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGSOFT Software Engineering Notes
      ACM SIGSOFT Software Engineering Notes  Volume 30, Issue 4
      July 2005
      1514 pages
      ISSN:0163-5948
      DOI:10.1145/1082983
      Issue’s Table of Contents
      • cover image ACM Other conferences
        SESS '05: Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
        May 2005
        112 pages
        ISBN:1595931147
        DOI:10.1145/1083200

      Copyright © 2005 Copyright is held by the owner/author(s)

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 May 2005

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader