Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

  • Schmitt C
  • Liggesmeyer P
N/ACitations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security information and knowledge sources and relevant compliance obligations, in a structured and reusable form. The resulting repository is intended to be used by development teams during the elicitation and analysis of security requirements with the goal to understand the security problem space, incorporate all relevant requirements sources, and to avoid unnecessary effort for identifying, understanding, and correlating applicable security requirements sources on a project-wise basis. We start with an overview and categorization of important security requirements sources, followed by the description of the generic model. To demonstrate the applicability and benefits of the model, the instantiation approach and details of the resulting repository of security requirements sources are presented.

Cite

CITATION STYLE

APA

Schmitt, C., & Liggesmeyer, P. (2015). Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources. Complex Systems Informatics and Modeling Quarterly, (3), 15–34. https://doi.org/10.7250/csimq.2015-3.02

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free