skip to main content
10.1145/1809100.1809101acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Reusing security requirements using an extended quality model

Published:02 May 2010Publication History

ABSTRACT

A reoccurring problem in software engineering constitutes ensuring sufficient completeness of requirements specifications with economically justifiable efforts. Formulating precise quality requirements and especially security requirements is elaborate as they depend on many stakeholders and technological aspects that are often unclear in early project phases. Threats that may have a severe impact on the software product are sometimes not even known. One approach to tackle this situation is reusing quality requirements, because they are to a high degree similar in different software products. The effect can be higher quality while at the same time saving time and budget.

Quality models are a way to explicitly specify quality. Based on activity-based quality models an approach for specifying reusable quality requirements in early project phases is proposed that also allows a direct derivation of suitable quality requirements for new projects. The applicability of this approach and the resulting reuse potential is investigated in a case study, which concentrates on the security requirements of six industrial projects.

References

  1. A. I. Anton and J. B. Earp. Strategies for developing policies and requirements for secure electronic commerce systems. Technical report, North Carolina State University at Raleigh, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. V. Basili, P. Donzelli, and S. Asgari. A unified model of dependability: Capturing dependability in context. IEEE Softw., 21(6):19--25, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. W. Boehm and P. N. Papaccio. Understanding and controlling software costs. IEEE Trans. Softw. Eng., 14(10):1462--1477, October 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. CCRA. Common criteria for information technology security evaluation, version 3.1. http://www.commoncriteria.org, 2009.Google ScholarGoogle Scholar
  5. L. M. Cysneiros and J. C. S. do Prado Leite. Nonfunctional Requirements: From Elicitation to Conceptual Models. IEEE Trans. Softw. Eng., 30(5), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Deissenboeck, E. Juergens, K. Lochmann, and S. Wagner. Software quality models: Purposes, usage scenarios and requirements. In Proc. 7th International Workshop on Software Quality (WoSQ 09). IEEE Computer Society, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F. Deissenboeck, S. Wagner, M. Pizka, S. Teuchert, and J. F. Girard. An activity-based quality model for maintainability. In Proc. IEEE International Conference on Software Maintenance (ICSM 2007), pages 184--193. IEEE Computer Society, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  8. J. Doerr, D. Kerkow, T. Koenig, T. Olsson, and T. Suzuki. Non-functional requirements in industry -- three case studies adopting an experience-based NFR method. In Proc. 13th International Conference on Requirements Engineering (RE'05), pages 373--382. IEEE Computer Society, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Ebert. Dealing with Nonfunctional Requirements in Large Software Systems. Ann. Softw. Eng., 3:367--395, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Federal Office for Information Security (BSI) in Germany. IT-Grundschutz Catalogues. https://www.bsi.bund.de/, 2007.Google ScholarGoogle Scholar
  11. D. Firesmith. Engineering security requirements. Journal of Object Technology, 2(1):53--68, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  12. M. Glinz. On non-functional requirements. In Proc. 15th IEEE International Requirements Engineering Conference. IEEE Computer Society, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  13. T. Gorschek and C. Wohlin. Requirements abstraction model. Requir. Eng., 11(1):79--101, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. B. Haley, R. C. Laney, J. D. Moffett, and B. Nuseibeh. Security requirements engineering: A framework for representation and analysis. IEEE Trans. Softw. Eng., 34(1):133--153, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Kazman, M. Klein, and P. Clements. ATAM: Method for architecture evaluation. Technical report, CMU/SEI, August 2000.Google ScholarGoogle Scholar
  16. B. Kitchenham and S. P. Pfleeger. Software quality: The elusive target. IEEE Softw., 13(1):12--21, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. Mellado, E. Fernandez-Medina, and M. Piattini. A common criteria based security requirements engineering process for the development of secure information systems. Computer Standards & Interfaces, 29(2):244--253, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. D. Mellado, E. F. Medina, and M. Piattini. Security requirements variability for software product lines. In Proc. Third International Conference on Availability, Reliability and Security (ARES '08), pages 1413--1420. IEEE Computer Society, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Mylopoulos, L. Chung, and B. Nixon. Representing and using nonfunctional requirements: A process-oriented approach. IEEE Trans. Softw. Eng., 18(6):483--497, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. G. Sindre, D. G. Firesmith, and A. L. Opdahl. A reuse-based approach to determining security requirements. In Proc. 9th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'03), pages 16--17, 2003.Google ScholarGoogle Scholar
  21. I. Sommerville. Software Engineering (6th Edition). Addison Wesley, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Wagner, F. Deissenboeck, and S. Winter. Managing quality requirements using activity-based quality models. In Proc. 6th Intern. Workshop on Software Quality (WoSQ '08), pages 29--34. ACM Press, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Wagner, D. Mendez Fernandez, S. Islam, and K. Lochmann. A security requirements approach for web systems. In Workshop Quality Assessment in Web (QAW 2009). 2009.Google ScholarGoogle Scholar

Index Terms

  1. Reusing security requirements using an extended quality model

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SESS '10: Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
        May 2010
        83 pages
        ISBN:9781605589657
        DOI:10.1145/1809100

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 May 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate8of11submissions,73%

        Upcoming Conference

        ICSE 2025

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader