Redirigiendo al acceso original de articulo en 24 segundos...
ARTÍCULO
TITULO

Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

Christian Schmitt    
Peter Liggesmeyer    

Resumen

This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security information and knowledge sources and relevant compliance obligations, in a structured and reusable form. The resulting repository is intended to be used by development teams during the elicitation and analysis of security requirements with the goal to understand the security problem space, incorporate all relevant requirements sources, and to avoid unnecessary effort for identifying, understanding, and correlating applicable security requirements sources on a project-wise basis. We start with an overview and categorization of important security requirements sources, followed by the description of the generic model. To demonstrate the applicability and benefits of the model, the instantiation approach and details of the resulting repository of security requirements sources are presented.

 Artículos similares

       
 
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman    
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver... ver más
Revista: Algorithms

 
Frank Moses,Kurt Sandkuhl     Pág. 54 - 68
The increasing digitalization of enterprises and public authorities has resulted in the growing importance of information technology in everyday operations. In this context, an information security management system (ISMS) has become an essential aspect ... ver más

 
Maram Fahaad Almufareh and Mamoona Humayun    
Security and performance (SAP) are two critical NFRs that affect the successful completion of software projects. Organizations need to follow the practices that are vital to SAP verification. These practices must be incorporated into the software develop... ver más
Revista: Applied Sciences

 
Christian Esposito, Ross Horne, Livio Robaldo, Bart Buelens and Elfi Goesaert    
The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, se... ver más
Revista: Information

 
Sabina Szymoniak, Filip Depta, Lukasz Karbowiak and Mariusz Kubanek    
Artificial Intelligence is an indispensable element of the modern world, constantly evolving and contributing to the emergence of new technologies. We meet it in everyday applications, primarily using intelligent systems that aim to improve our lives. Ar... ver más
Revista: Applied Sciences