loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Roman Wirtz 1 ; Maritta Heisel 1 ; Rene Meis 1 ; Aida Omerovic 2 and Ketil Stølen 2

Affiliations: 1 University of Duisburg-Essen, Germany ; 2 SINTEF Institute, Norway

Keyword(s): Risk Management, Security, Requirements Engineering, Problem-based, Model-based.

Related Ontology Subjects/Areas/Topics: Artificial Intelligence ; Cross-Feeding between Data and Software Engineering ; Knowledge Management and Information Sharing ; Knowledge-Based Systems ; Model-Driven Engineering ; Requirements Engineering ; Software Engineering ; Software Engineering Methods and Techniques ; Symbolic Systems

Abstract: Security is of great importance for many software systems. The security of a software system can be compromised by threats, which may harm assets with a certain likelihood, thus constituting a risk. All such risks should be identified, and unacceptable risks should be reduced, which gives rise to security requirements. The relevant security requirements should be known right from the beginning of the software development process. Eliciting security requirements should be done in a systematic way. We propse a method to elicit security requirements that address unacceptable risks. They require a reduction of the risk to an acceptable level. Our method combines the CORAS risk management method with Jackson’s problem-based requirements analysis approach. Based on the functional requirements for a software system, security risks are identified and evaluated. Unacceptable risks give rise to high-level security requirements. To reduce the risk, treatments are selected. Based on the selected treatments, concretized security requirements are set up and represented in a similar way as functional requirements. Thus, both functional and security requirements can then drive the software development process. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.238.57.9

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Wirtz, R.; Heisel, M.; Meis, R.; Omerovic, A. and Stølen, K. (2018). Problem-based Elicitation of Security Requirements - The ProCOR Method. In Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering - ENASE; ISBN 978-989-758-300-1; ISSN 2184-4895, SciTePress, pages 26-38. DOI: 10.5220/0006669400260038

@conference{enase18,
author={Roman Wirtz. and Maritta Heisel. and Rene Meis. and Aida Omerovic. and Ketil Stølen.},
title={Problem-based Elicitation of Security Requirements - The ProCOR Method},
booktitle={Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering - ENASE},
year={2018},
pages={26-38},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006669400260038},
isbn={978-989-758-300-1},
issn={2184-4895},
}

TY - CONF

JO - Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering - ENASE
TI - Problem-based Elicitation of Security Requirements - The ProCOR Method
SN - 978-989-758-300-1
IS - 2184-4895
AU - Wirtz, R.
AU - Heisel, M.
AU - Meis, R.
AU - Omerovic, A.
AU - Stølen, K.
PY - 2018
SP - 26
EP - 38
DO - 10.5220/0006669400260038
PB - SciTePress