• DocumentCode
    257593
  • Title

    Managing security requirements patterns using feature diagram hierarchies

  • Author

    Slavin, Rocky ; Lehker, Jean-Michel ; Jianwei Niu ; Breaux, Travis D.

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Texas at San Antonio, San Antonio, TX, USA
  • fYear
    2014
  • fDate
    25-29 Aug. 2014
  • Firstpage
    193
  • Lastpage
    202
  • Abstract
    Security requirements patterns represent reusable security practices that software engineers can apply to improve security in their system. Reusing best practices that others have employed could have a number of benefits, such as decreasing the time spent in the requirements elicitation process or improving the quality of the product by reducing product failure risk. Pattern selection can be difficult due to the diversity of applicable patterns from which an analyst has to choose. The challenge is that identifying the most appropriate pattern for a situation can be cumbersome and time-consuming. We propose a new method that combines an inquiry-cycle based approach with the feature diagram notation to review only relevant patterns and quickly select the most appropriate patterns for the situation. Similar to patterns themselves, our approach captures expert knowledge to relate patterns based on decisions made by the pattern user. The resulting pattern hierarchies allow users to be guided through these decisions by questions, which introduce related patterns in order to help the pattern user select the most appropriate patterns for their situation, thus resulting in better requirement generation. We evaluate our approach using access control patterns in a pattern user study.
  • Keywords
    authorisation; risk analysis; software quality; software reusability; access control patterns; feature diagram hierarchies; feature diagram notation; inquiry-cycle based approach; pattern hierarchies; pattern user study; product failure risk; product quality; requirement generation; requirements elicitation process; reusable security practices; security requirements patterns; software engineers; Authentication; Authorization; Context; Knowledge engineering; Software; Security; feature diagram; patterns; requirements;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Requirements Engineering Conference (RE), 2014 IEEE 22nd International
  • Conference_Location
    Karlskrona
  • Print_ISBN
    978-1-4799-3031-9
  • Type

    conf

  • DOI
    10.1109/RE.2014.6912261
  • Filename
    6912261