• DocumentCode
    2320337
  • Title

    Characterizations and boundaries of security requirements patterns

  • Author

    Slavin, Rocky ; Shen, Hui ; Niu, Jianwei

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Texas at San Antonio, San Antonio, TX, USA
  • fYear
    2012
  • fDate
    24-24 Sept. 2012
  • Firstpage
    48
  • Lastpage
    53
  • Abstract
    Very often in the software development life cycle, security is applied too late or important security aspects are overlooked. Although the use of security patterns is gaining popularity, the current state of security requirements patterns is such that there is not much in terms of a defining structure. To address this issue, we are working towards defining the important characteristics as well as the boundaries for security requirements patterns in order to make them more effective. By examining an existing general pattern format that describes how security patterns should be structured and comparing it to existing security requirements patterns, we are deriving characterizations and boundaries for security requirements patterns. From these attributes, we propose a defining format. We hope that these can reduce user effort in elicitation and specification of security requirements patterns.
  • Keywords
    security of data; software engineering; boundaries; characterizations; defining format; security aspects; security requirements patterns; software development life cycle; Context; Guidelines; Security; Silicon; Software systems; Unified modeling language; patterns; security; security requirements;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Requirements Patterns (RePa), 2012 IEEE Second International Workshop on
  • Conference_Location
    Chicago, IL
  • Print_ISBN
    978-1-4673-4374-9
  • Electronic_ISBN
    978-1-4673-4375-6
  • Type

    conf

  • DOI
    10.1109/RePa.2012.6359974
  • Filename
    6359974