Reference Hub14
Security Requirements Engineering for Evolving Software Systems: A Survey

Security Requirements Engineering for Evolving Software Systems: A Survey

Armstrong Nhlabatsi, Bashar Nuseibeh, Yijun Yu
Copyright: © 2010 |Volume: 1 |Issue: 1 |Pages: 20
ISSN: 1947-3036|EISSN: 1947-3044|ISSN: 1947-3036|EISBN13: 9781609600044|EISSN: 1947-3044|DOI: 10.4018/jsse.2010102004
Cite Article Cite Article

MLA

Nhlabatsi, Armstrong, et al. "Security Requirements Engineering for Evolving Software Systems: A Survey." IJSSE vol.1, no.1 2010: pp.54-73. http://doi.org/10.4018/jsse.2010102004

APA

Nhlabatsi, A., Nuseibeh, B., & Yu, Y. (2010). Security Requirements Engineering for Evolving Software Systems: A Survey. International Journal of Secure Software Engineering (IJSSE), 1(1), 54-73. http://doi.org/10.4018/jsse.2010102004

Chicago

Nhlabatsi, Armstrong, Bashar Nuseibeh, and Yijun Yu. "Security Requirements Engineering for Evolving Software Systems: A Survey," International Journal of Secure Software Engineering (IJSSE) 1, no.1: 54-73. http://doi.org/10.4018/jsse.2010102004

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Long-lived software systems often undergo evolution over an extended period. Evolution of these systems is inevitable as they need to continue to satisfy changing business needs, new regulations and standards, and introduction of novel technologies. Such evolution may involve changes that add, remove, or modify features; or that migrate the system from one operating platform to another. These changes may result in requirements that were satisfied in a previous release of a system not being satisfied in subsequent versions. When evolutionary changes violate security requirements, a system may be left vulnerable to attacks. In this article we review current approaches to security requirements engineering and conclude that they lack explicit support for managing the effects of software evolution. We then suggest that a cross fertilization of the areas of software evolution and security engineering would address the problem of maintaining compliance to security requirements of software systems as they evolve.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.