Reference Hub3
Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods

Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods

Nancy R. Mead
Copyright: © 2010 |Volume: 1 |Issue: 1 |Pages: 18
ISSN: 1947-3036|EISSN: 1947-3044|ISSN: 1947-3036|EISBN13: 9781609600044|EISSN: 1947-3044|DOI: 10.4018/jsse.2010102005
Cite Article Cite Article

MLA

Mead, Nancy R. "Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods." IJSSE vol.1, no.1 2010: pp.74-91. http://doi.org/10.4018/jsse.2010102005

APA

Mead, N. R. (2010). Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods. International Journal of Secure Software Engineering (IJSSE), 1(1), 74-91. http://doi.org/10.4018/jsse.2010102005

Chicago

Mead, Nancy R. "Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods," International Journal of Secure Software Engineering (IJSSE) 1, no.1: 74-91. http://doi.org/10.4018/jsse.2010102005

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The premise of this article is that pilot case studies in security requirements engineering provide both benefits and challenges to the underlying research, education, and technology transition effort. Over the past four years we have worked with seven development groups in five organizations in the process of refining and transitioning the Security Quality Requirements Engineering (SQUARE) and SQUARE-Lite methods into practice. These experiences have provided the opportunity to step back and assess the use of pilots in conjunction with student projects to support method refinement and technology transition. Although SQUARE and SQUARE-Lite are concerned with security requirements, the benefits and challenges that have been observed would apply to many security research and technology transition efforts. We itemize and justify these benefits and challenges and discuss their practical relevance and application to ensuring adequate information assurance protection.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.