Managing security requirements patterns using feature diagram hierarchies

Requirements Engineering Conference(2014)

引用 22|浏览11
暂无评分
摘要
Security requirements patterns represent reusable security practices that software engineers can apply to improve security in their system. Reusing best practices that others have employed could have a number of benefits, such as decreasing the time spent in the requirements elicitation process or improving the quality of the product by reducing product failure risk. Pattern selection can be difficult due to the diversity of applicable patterns from which an analyst has to choose. The challenge is that identifying the most appropriate pattern for a situation can be cumbersome and time-consuming. We propose a new method that combines an inquiry-cycle based approach with the feature diagram notation to review only relevant patterns and quickly select the most appropriate patterns for the situation. Similar to patterns themselves, our approach captures expert knowledge to relate patterns based on decisions made by the pattern user. The resulting pattern hierarchies allow users to be guided through these decisions by questions, which introduce related patterns in order to help the pattern user select the most appropriate patterns for their situation, thus resulting in better requirement generation. We evaluate our approach using access control patterns in a pattern user study.
更多
查看译文
关键词
authorisation,risk analysis,software quality,software reusability,access control patterns,feature diagram hierarchies,feature diagram notation,inquiry-cycle based approach,pattern hierarchies,pattern user study,product failure risk,product quality,requirement generation,requirements elicitation process,reusable security practices,security requirements patterns,software engineers,Security,feature diagram,patterns,requirements
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要