A comparative study of proposals for establishing security requirements for the development of secure information systems

17Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays, security solutions are focused mainly on providing security defences, instead of solving one of the main reasons for security problems that refers to an appropriate Information Systems (IS) design. In this paper a comparative analysis of eight different relevant technical proposals, which place great importance on the establishing of security requirements in the development of IS, is carried out. And they provide some significant contributions in aspects related to security. These can serve as a basis for new methodologies or as extensions to existing ones. Nevertheless, they only satisfy partly the necessary criteria for the establishment of security requirements, with guarantees and integration in the development of IS. Thus we conclude that they are not specific enough for dealing with security requirements in the first stages of software development in a systematic and intuitive way, though parts of the proposals, if taken as complementary measures, can be used in that manner. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Mellado, D., Fernández-Medina, E., & Piattini, M. (2006). A comparative study of proposals for establishing security requirements for the development of secure information systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3982 LNCS, pp. 1044–1053). Springer Verlag. https://doi.org/10.1007/11751595_109

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free